Sciweavers

37 search results - page 4 / 8
» Name Strategy: Its Existence and Implications
Sort
View
VLDB
2007
ACM
104views Database» more  VLDB 2007»
14 years 6 months ago
Extending Dependencies with Conditions
This paper introduces a class of conditional inclusion dependencies (CINDs), which extends traditional inclusion dependencies (INDs) by enforcing bindings of semantically related ...
Loreto Bravo, Wenfei Fan, Shuai Ma
MIR
2006
ACM
150views Multimedia» more  MIR 2006»
14 years 16 days ago
Exploring temporal consistency for video analysis and retrieval
Temporal consistency is ubiquitous in video data, where temporally adjacent video shots usually share similar visual and semantic content. This paper presents a thorough study of ...
Jun Yang 0003, Alexander G. Hauptmann
ISF
2010
109views more  ISF 2010»
13 years 5 months ago
From IT deployment capabilities to competitive advantage: An exploratory study in China
As more and more companies are deploying, or plan to deploy, information systems, the organizational capabilities to effectively deploy information technologies to support and shap...
Jun Tian, Kanliang Wang, Yan Chen, Björn Joha...
CEAS
2007
Springer
14 years 23 days ago
Slicing Spam with Occam's Razor
To evade blacklisting, the vast majority of spam email is sent from exploited MTAs (i.e., botnets) and with forged “From” addresses. In response, the anti-spam community has d...
Chris Fleizach, Geoffrey M. Voelker, Stefan Savage
ACSAC
2006
IEEE
14 years 20 days ago
A Module System for Isolating Untrusted Software Extensions
With the recent advent of dynamically extensible software systems, in which software extensions may be dynamically loaded into the address space of a core application to augment i...
Philip W. L. Fong, Simon A. Orr