Sciweavers

2084 search results - page 266 / 417
» Knowledge Exploitation from the Web
Sort
View
WISE
2009
Springer
14 years 8 months ago
Entry Pairing in Inverted File
Abstract. This paper proposes to exploit content and usage information to rearrange an inverted index for a full-text IR system. The idea is to merge the entries of two frequently ...
Hoang Thanh Lam, Raffaele Perego, Nguyen Thoi Minh...
DIAL
2006
IEEE
185views Image Analysis» more  DIAL 2006»
14 years 4 months ago
Automatic Content-based Indexing of Digital Documents through Intelligent Processing Techniques
The availability of large, heterogeneous repositories of electronic documents is increasing rapidly, and the need for flexible, sophisticated document manipulation tools is growi...
Floriana Esposito, Stefano Ferilli, Teresa Maria A...
SWAP
2008
14 years 6 days ago
Uniform Access to Domotic Environments through Semantics
This paper proposes a Domotic OSGi Gateway (DOG) able to expose different domotic networks as a single, technology neutral, home automation system. The adoption of a standard frame...
Dario Bonino, Emiliano Castellina, Fulvio Corno
USS
2010
13 years 8 months ago
Structuring Protocol Implementations to Protect Sensitive Data
In a bid to limit the harm caused by ubiquitous remotely exploitable software vulnerabilities, the computer systems security community has proposed primitives to allow execution o...
Petr Marchenko, Brad Karp
PET
2005
Springer
14 years 4 months ago
Privacy Vulnerabilities in Encrypted HTTP Streams
Abstract. Encrypting traffic does not prevent an attacker from performing some types of traffic analysis. We present a straightforward traffic analysis attack against encrypted HT...
George Dean Bissias, Marc Liberatore, David Jensen...