Sciweavers

5752 search results - page 1029 / 1151
» Informative Labeling Schemes
Sort
View
SEC
2008
13 years 10 months ago
Software Licence Protection and Management for Organisations
Abstract Most organisations have recently converted their physical assets into digital forms. This underlines the needs to have different types of software products to manage such ...
Muntaha Alawneh, Imad M. Abbadi
SICHERHEIT
2008
13 years 10 months ago
A Cryptographic Biometric Authentication System based on Genetic Fingerprints
We specify a system for authentication and key derivation using genetic fingerprints which prevents the recovery of biometric information from data stored for verification. We pre...
Ulrike Korte, Michael Krawczak, Johannes Merkle, R...
TRECVID
2008
13 years 10 months ago
Informedia @ TRECVID2008: Exploring New Frontiers
The Informedia team participated in the tasks of Rushes summarization, high-level feature extraction and event detection in surveillance video. For the rushes summarization, our b...
Alexander G. Hauptmann, Robert V. Baron, Ming-yu C...
SDM
2007
SIAM
177views Data Mining» more  SDM 2007»
13 years 10 months ago
Bursty Feature Representation for Clustering Text Streams
Text representation plays a crucial role in classical text mining, where the primary focus was on static text. Nevertheless, well-studied static text representations including TFI...
Qi He, Kuiyu Chang, Ee-Peng Lim, Jun Zhang
DAIS
2003
13 years 10 months ago
Middleware Support for Resource-Constrained Software Deployment
Abstract The JAMUS platform is dedicated to providing a safe runtime environment for untrusted Java application programs, while offering each of these programs access to the resour...
Nicolas Le Sommer, Frédéric Guidec
« Prev « First page 1029 / 1151 Last » Next »