Sciweavers

729 search results - page 101 / 146
» Making news understandable to computers
Sort
View
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
13 years 7 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
JASIS
2011
98views more  JASIS 2011»
13 years 4 months ago
Hip and trendy: Characterizing emerging trends on Twitter
Twitter, Facebook, and other related systems that we call social awareness streams are rapidly changing the information and communication dynamics of our society. These systems, w...
Mor Naaman, Hila Becker, Luis Gravano
JDCTA
2010
126views more  JDCTA 2010»
13 years 4 months ago
Continuous Neural Decoding Method Based on General Regression Neural Network
Neural decoding is an important task for understanding how the biological nervous system performs computation and communication. This paper introduces a novel continuous neural de...
Jianhua Dai, Xiaochun Liu, Shaomin Zhang, Huaijian...
CORR
2011
Springer
161views Education» more  CORR 2011»
13 years 1 months ago
A Panorama on Multiscale Geometric Representations, Intertwining Spatial, Directional and Frequency Selectivity
The richness of natural images makes the quest for optimal representations in image processing and computer vision challenging. The latter observation has not prevented the design...
Laurent Jacques, Laurent Duval, Caroline Chaux, Ga...
ISCA
2012
IEEE
242views Hardware» more  ISCA 2012»
12 years 10 days ago
Side-channel vulnerability factor: A metric for measuring information leakage
There have been many attacks that exploit side-effects of program execution to expose secret information and many proposed countermeasures to protect against these attacks. Howeve...
John Demme, Robert Martin, Adam Waksman, Simha Set...