Sciweavers

1968 search results - page 373 / 394
» Japanese Information Extraction with Automatically Extracted...
Sort
View
CMS
2010
150views Communications» more  CMS 2010»
13 years 7 months ago
Throwing a MonkeyWrench into Web Attackers Plans
Abstract. Client-based attacks on internet users with malicious web pages represent a serious and rising threat. Internet Browsers with enabled active content technologies such as ...
Armin Büscher, Michael Meier, Ralf Benzmü...
CGF
2008
151views more  CGF 2008»
13 years 7 months ago
Reconstructing head models from photographs for individualized 3D-audio processing
Visual fidelity and interactivity are the main goals in Computer Graphics research, but recently also audio is assuming an important role. Binaural rendering can provide extremely...
Matteo Dellepiane, Nico Pietroni, Tsingos Tsingos,...
ACL
2010
13 years 5 months ago
Hunting for the Black Swan: Risk Mining from Text
In the business world, analyzing and dealing with risk permeates all decisions and actions. However, to date, risk identification, the first step in the risk management cycle, has...
Jochen L. Leidner, Frank Schilder
TVCG
2012
203views Hardware» more  TVCG 2012»
11 years 10 months ago
Morse Set Classification and Hierarchical Refinement Using Conley Index
—Morse decomposition provides a numerically stable topological representation of vector fields that is crucial for their rigorous interpretation. However, Morse decomposition is ...
Guoning Chen, Qingqing Deng, Andrzej Szymczak, Rob...
WWW
2008
ACM
14 years 8 months ago
LocalSavvy: aggregating local points of view about news issues
The web has become an important medium for news delivery and consumption. Fresh content about a variety of topics, events, and places is constantly being created and published on ...
Jiahui Liu, Larry Birnbaum