Sciweavers

1671 search results - page 75 / 335
» Semantics Through Pictures
Sort
View
CODES
2005
IEEE
14 years 1 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
MIR
2004
ACM
125views Multimedia» more  MIR 2004»
14 years 1 months ago
Autonomous visual model building based on image crawling through internet search engines
In this paper, we propose an autonomous learning scheme to automatically build visual semantic concept models from the output data of Internet search engines without any manual la...
Xiaodan Song, Ching-Yung Lin, Ming-Ting Sun
ANLP
2000
108views more  ANLP 2000»
13 years 9 months ago
A Weighted Robust Parsing Approach to Semantic Annotation
This paper proposes a grammar-based approach to semantic annotation which combines the notions of robust parsing and fuzzy grammars. We present an overview of a preliminary resear...
Hatem Ghorbel, Vincenzo Pallotta
CHI
2009
ACM
14 years 8 months ago
A personalized walk through the museum: the CHIP interactive tour guide
More and more museums aim at enhancing their visitors' museum experiences in a personalized, intensive and engaging way inside the museum. The CHIP1 (Cultural Heritage Inform...
Ivo Roes, Natalia Stash, Yiwen Wang, Lora Aroyo
PPOPP
2009
ACM
14 years 8 months ago
Safe open-nested transactions through ownership
Researchers in transactional memory (TM) have proposed open nesting as a methodology for increasing the concurrency of transactional programs. The idea is to ignore "low-leve...
Kunal Agrawal, I.-Ting Angelina Lee, Jim Sukha