Sciweavers

8249 search results - page 1443 / 1650
» The DBO database system
Sort
View
COMPSEC
2007
52views more  COMPSEC 2007»
15 years 4 months ago
Privacy-preserving programming using sython
— Programmers often have access to confidential data that are not strictly needed for program development. Broad priveleges from accounts given to programmers allow them to view...
Michael Gaiman, Rahul Simha, Bhagirath Narahari
IVS
2008
79views more  IVS 2008»
15 years 4 months ago
Scalable and interactive visual analysis of financial wire transactions for fraud detection
Large financial institutions such as Bank of America handle hundreds of thousands of wire transactions per day. Although most transactions are legitimate, these institutions have ...
Remco Chang, Alvin Lee, Mohammad Ghoniem, Robert K...
150
Voted
JAIR
2008
118views more  JAIR 2008»
15 years 4 months ago
On the Use of Automatically Acquired Examples for All-Nouns Word Sense Disambiguation
This article focuses on Word Sense Disambiguation (WSD), which is a Natural Language Processing task that is thought to be important for many Language Technology applications, suc...
David Martínez, Oier Lopez de Lacalle, Enek...
CORR
2007
Springer
110views Education» more  CORR 2007»
15 years 4 months ago
AMIE: An annotation model for information research
The objective of most users for consulting any information database, information warehouse or the internet is to resolve one problem or the other. Available online or offline anno...
Charles A. Robert, David Amos
JUCS
2008
155views more  JUCS 2008»
15 years 4 months ago
Combining Classifiers in the ROC-space for Off-line Signature Verification
: In this work we present a strategy for off-line signature verification. It takes into account a writer-independent model which reduces the pattern recognition problem to a 2-clas...
Luiz S. Oliveira, Edson J. R. Justino, Robert Sabo...
« Prev « First page 1443 / 1650 Last » Next »