Sciweavers

15372 search results - page 2988 / 3075
» The Semantics of Semantic Annotation
Sort
View
107
Voted
CCS
2006
ACM
15 years 7 months ago
An effective defense against email spam laundering
Laundering email spam through open-proxies or compromised PCs is a widely-used trick to conceal real spam sources and reduce spamming cost in underground email spam industry. Spam...
Mengjun Xie, Heng Yin, Haining Wang
CGO
2006
IEEE
15 years 7 months ago
Dynamic Class Hierarchy Mutation
Class hierarchies in object-oriented programs are used to capture various attributes of the underlying objects they represent, allowing programmers to encapsulate common attribute...
Lixin Su, Mikko H. Lipasti
CIVR
2010
Springer
204views Image Analysis» more  CIVR 2010»
15 years 7 months ago
Utilizing related samples to learn complex queries in interactive concept-based video search
One of the main challenges in interactive concept-based video search is the insufficient relevant sample problem, especially for queries with complex semantics. To address this pr...
Jin Yuan, Zheng-Jun Zha, Zhengdong Zhao, Xiangdong...
DAWAK
2006
Springer
15 years 7 months ago
A Versioning Management Model for Ontology-Based Data Warehouses
More and more integration systems use ontologies to solve the problem of semantic heterogeneities between autonomous databases. To automate the integration process, a number of the...
Dung Nguyen Xuan, Ladjel Bellatreche, Guy Pierra
EDBTW
2006
Springer
15 years 7 months ago
Spatio-temporal Aggregates over Streaming Geospatial Image Data
Geospatial image data obtained by satellites and aircraft are increasingly important to a wide range of applications, such as disaster management, climatology, and environmental m...
Jie Zhang
« Prev « First page 2988 / 3075 Last » Next »