Sciweavers

2049 search results - page 384 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
MSR
2006
ACM
14 years 3 months ago
Using software birthmarks to identify similar classes and major functionalities
Software birthmarks are unique and native characteristics of every software component. Two components having similar birthmarks indicate that they are similar in functionality, st...
Takeshi Kakimoto, Akito Monden, Yasutaka Kamei, Ha...
ESWS
2005
Springer
14 years 3 months ago
RELFIN - Topic Discovery for Ontology Enhancement and Annotation
While classic information retrieval methods return whole documents as a result of a query, many information demands would be better satisfied by fine-grain access inside the docu...
Markus Schaal, Roland M. Müller, Marko Brunze...
ACCV
2010
Springer
13 years 4 months ago
Social Interactive Human Video Synthesis
In this paper, we propose a computational model for social interaction between three people in a conversation, and demonstrate results using human video motion synthesis. We utilis...
Dumebi Okwechime, Eng-Jon Ong, Andrew Gilbert, Ric...
SOUPS
2009
ACM
14 years 4 months ago
How users use access control
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requ...
Diana K. Smetters, Nathan Good
PKDD
2004
Springer
205views Data Mining» more  PKDD 2004»
14 years 3 months ago
Breaking Through the Syntax Barrier: Searching with Entities and Relations
The next wave in search technology will be driven by the identification, extraction, and exploitation of real-world entities represented in unstructured textual sources. Search sy...
Soumen Chakrabarti