Sciweavers

1358 search results - page 193 / 272
» Proceedings
Sort
View
151
Voted
IWRIDL
2006
ACM
141views Education» more  IWRIDL 2006»
15 years 9 months ago
Shallow syntax analysis in Sanskrit guided by semantic nets constraints
We present the state of the art of a computational platform for the analysis of classical Sanskrit. The platform comprises modules for phonology, morphology, segmentation and shal...
Gérard P. Huet
122
Voted
MIR
2006
ACM
267views Multimedia» more  MIR 2006»
15 years 9 months ago
Matching slides to presentation videos using SIFT and scene background matching
We present a general approach for automatically matching electronic slides to videos of corresponding presentations for use in distance learning and video proceedings of conferenc...
Quanfu Fan, Kobus Barnard, Arnon Amir, Alon Efrat,...
145
Voted
PLDI
2006
ACM
15 years 9 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
146
Voted
SASN
2006
ACM
15 years 9 months ago
Autonomous and distributed node recovery in wireless sensor networks
Intrusion or misbehaviour detection systems are an important and widely accepted security tool in computer and wireless sensor networks. Their aim is to detect misbehaving or faul...
Mario Strasser, Harald Vogt
135
Voted
SIGCPR
2006
ACM
106views Hardware» more  SIGCPR 2006»
15 years 9 months ago
Cross-cultural influences on women in the IT workforce
A review of 862 papers published in SIGMIS/CPR proceedings over the past 44 years revealed only 29 articles that focused on gender and the IT workforce or gender and IT education,...
Eileen M. Trauth, Jeria L. Quesenberry, Haiyan Hua...