Sciweavers

4276 search results - page 784 / 856
» Techniques for Empirical Validation
Sort
View
CCS
2006
ACM
14 years 1 months ago
An effective defense against email spam laundering
Laundering email spam through open-proxies or compromised PCs is a widely-used trick to conceal real spam sources and reduce spamming cost in underground email spam industry. Spam...
Mengjun Xie, Heng Yin, Haining Wang
DILS
2006
Springer
14 years 1 months ago
An Extensible Light-Weight XML-Based Monitoring System for Sequence Databases
Life science researchers want biological information in their interest to become available to them as soon as possible. A monitoring system is a solution that relieves biologists f...
Dieter Van de Craen, Frank Neven, Kerstin Koch
ECCV
2006
Springer
14 years 1 months ago
Segmentation and Guidance of Multiple Rigid Objects for Intra-operative Endoscopic Vision
Abstract. This paper presents an endoscopic vision framework for modelbased 3D guidance of surgical instruments used in robotized laparoscopic surgery. In order to develop such a s...
Christophe Doignon, Florent Nageotte, Michel de Ma...
COMPGEOM
2001
ACM
14 years 1 months ago
Computational geometry for sculpture
This presentation illustrates examples of my geometric sculpture and outlines certain design techniques. I apply methods from the field of computational geometry to the creation o...
George W. Hart
CIKM
2008
Springer
14 years 1 days ago
Tag data and personalized information retrieval
Researchers investigating personalization techniques for Web Information Retrieval face a challenge; that the data required to perform evaluations, namely query logs and clickthro...
Mark James Carman, Mark Baillie, Fabio Crestani