Sciweavers

708 search results - page 118 / 142
» Support for Informal Information Use and its Formalization i...
Sort
View
IJPRAI
2002
97views more  IJPRAI 2002»
13 years 7 months ago
Shape Description and Invariant Recognition Employing Connectionist Approach
This paper presents a new approach for shape description and invariant recognition by geometric-normalization implemented by neural networks. The neural system consists of a shape...
Jezekiel Ben-Arie, Zhiqian Wang
CHI
2007
ACM
14 years 8 months ago
Multiview: improving trust in group video conferencing through spatial faithfulness
Video conferencing is still considered a poor alternative to face-to-face meetings. In the business setting, where these systems are most prevalent, the misuse of video conferenci...
David T. Nguyen, John Canny
VLDB
2002
ACM
97views Database» more  VLDB 2002»
13 years 7 months ago
Structural Function Inlining Technique for Structurally Recursive XML Queries
Structurally recursive XML queries are an important query class that follows the structure of XML data. At present, it is difficult for XQuery to type and optimize structurally re...
Chang-Won Park, Jun-Ki Min, Chin-Wan Chung
SIGSOFT
2010
ACM
13 years 5 months ago
Software intelligence: the future of mining software engineering data
Mining software engineering data has emerged as a successful research direction over the past decade. In this position paper, we advocate Software Intelligence (SI) as the future ...
Ahmed E. Hassan, Tao Xie
IFIP
2009
Springer
14 years 2 months ago
Trusted Multiplexing of Cryptographic Protocols
Abstract. We present an analysis that determines when it is possible to multiplex a pair of cryptographic protocols. We present a transformation that improves the coverage of this ...
Jay A. McCarthy, Shriram Krishnamurthi