Sciweavers

1178 search results - page 173 / 236
» Modeling and analysis of content identification
Sort
View
AVI
2010
13 years 10 months ago
User task-based development of multi-device service-oriented applications
In this paper, we discuss a method and the associated tool support able to exploit Web services in model-based user interface development, starting with the results of a task anal...
Fabio Paternò, Carmen Santoro, Lucio Davide...
CCS
2005
ACM
14 years 2 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...
FOSSACS
2009
Springer
14 years 3 months ago
Beyond Shapes: Lists with Ordered Data
Standard analysis on recursive data structures restrict their attention to shape properties (for instance, a program that manipulates a list returns a list), excluding properties t...
Kshitij Bansal, Rémi Brochenin, Étie...
ICRA
2008
IEEE
149views Robotics» more  ICRA 2008»
14 years 3 months ago
Information-optimal selective data return for autonomous rover traverse science and survey
— Selective data return leverages onboard data analysis to allocate limited bandwidth resources during remote exploration. Here we present an adaptive method to subsample image s...
David R. Thompson, Trey Smith, David Wettergreen
DAS
2010
Springer
14 years 1 months ago
Associating figures with descriptions for patent documents
Patent document images maintained by the U.S. patent database have a specific format, in which figures and text descriptions are separated into different sections. This makes it...
Linlin Li, Chew Lim Tan