Sciweavers

1497 search results - page 254 / 300
» Navigation in RDF Data
Sort
View
SOUPS
2006
ACM
14 years 4 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
ICPR
2010
IEEE
14 years 4 months ago
Novel Edge Features for Text Frame Classification in Video
Text frame classification is needed in many applications such as event identification, exact event boundary identification, navigation, video surveillance in multimedia etc. To the...
Shivakumara Palaiahnakote, Chew-Lim Tan
MM
2005
ACM
142views Multimedia» more  MM 2005»
14 years 4 months ago
Organum: individual presence through collaborative play
Organum Playtest is an interactive installation in which three players collaboratively navigate through a model of the human voice box, using their voices as a joystick. By asking...
Greg Niemeyer, Dan Perkel, Ryan Shaw, Jane McGonig...
SOFTVIS
2005
ACM
14 years 4 months ago
Towards understanding programs through wear-based filtering
Large software projects often require a programmer to make changes to unfamiliar source code. This paper presents the results of a formative observational study of seven professio...
Robert DeLine, Amir Khella, Mary Czerwinski, Georg...
ADBIS
2005
Springer
163views Database» more  ADBIS 2005»
14 years 4 months ago
XML Databases and Beyond - Plenty of Architectural Challenges Ahead
A key observation is that the invariants in database management determine the mapping steps of the supporting architecture. Referring to the multi-layered architecture of record-or...
Theo Härder