Sciweavers

692 search results - page 131 / 139
» Thesaurus Based Term Ranking for Keyword Extraction
Sort
View
CCS
2008
ACM
13 years 9 months ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...
CLEF
2008
Springer
13 years 9 months ago
GeoCLEF 2008: The CLEF 2008 Cross-Language Geographic Information Retrieval Track Overview
GeoCLEF is an evaluation initiative for testing queries with a geographic specification in large set of text documents. GeoCLEF ran a regular track for the third time within the C...
Thomas Mandl, Paula Carvalho, Giorgio Maria Di Nun...
KAIS
2006
172views more  KAIS 2006»
13 years 7 months ago
CoMMA: a framework for integrated multimedia mining using multi-relational associations
Generating captions or annotations automatically for still images is a challenging task. Traditionally, techniques involving higher-level (semantic) object detection and complex f...
Ankur Teredesai, Muhammad A. Ahmad, Juveria Kanodi...
AOSD
2011
ACM
13 years 2 months ago
Closure joinpoints: block joinpoints without surprises
Block joinpoints allow programmers to explicitly mark regions of base code as “to be advised”, thus avoiding the need to extract the block into a method just for the sake of c...
Eric Bodden
GIS
2008
ACM
14 years 8 months ago
Fast and extensible building modeling from airborne LiDAR data
This paper presents an automatic algorithm which reconstructs building models from airborne LiDAR (light detection and ranging) data of urban areas. While our algorithm inherits t...
Qian-Yi Zhou, Ulrich Neumann