Sciweavers

756 search results - page 132 / 152
» Integrating information sources for recommender systems
Sort
View
HIPEAC
2005
Springer
14 years 26 days ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee
MVA
2006
205views Computer Vision» more  MVA 2006»
13 years 7 months ago
Ontological inference for image and video analysis
Abstract This paper presents an approach to designing and implementing extensible computational models for perceiving systems based on a knowledge-driven joint inference approach. ...
Christopher Town
PVLDB
2010
168views more  PVLDB 2010»
13 years 5 months ago
Transforming XML Documents as Schemas Evolve
Database systems often use XML schema to describe the format of valid XML documents. Usually, this format is determined when the system is designed. Sometimes, in an already funct...
Jarek Gryz, Marcin Kwietniewski, Stephanie Hazlewo...
ICSE
2011
IEEE-ACM
12 years 10 months ago
Miler: a toolset for exploring email data
Source code is the target and final outcome of software development. By focusing our research and analysis on source code only, we risk forgetting that software is the product of...
Alberto Bacchelli, Michele Lanza, Marco D'Ambros
ISM
2006
IEEE
95views Multimedia» more  ISM 2006»
14 years 1 months ago
Digital Rights Management for Video Sensor Network
Video sensor network is evolving from an isolated system to an integral component of the global information infrastructure. In this paper, we argue that when video sensor network ...
Taojun Wu, Liang Dai, Yuan Xue, Yi Cui