Sciweavers

1134 search results - page 151 / 227
» Towards a Theory of Information Systems: The FRISCO Approach
Sort
View
FUIN
2008
142views more  FUIN 2008»
13 years 9 months ago
Relational Transformation-based Tagging for Activity Recognition
Abstract. The ability to recognize human activities from sensory information is essential for developing the next generation of smart devices. Many human activity recognition tasks...
Niels Landwehr, Bernd Gutmann, Ingo Thon, Luc De R...
IPCCC
2006
IEEE
14 years 2 months ago
Optimising malware
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
José M. Fernandez, Pierre-Marc Bureau
ICA
2007
Springer
14 years 3 months ago
Compressed Sensing and Source Separation
Abstract. Separation of underdetermined mixtures is an important problem in signal processing that has attracted a great deal of attention over the years. Prior knowledge is requir...
Thomas Blumensath, Mike E. Davies
SACMAT
2011
ACM
12 years 11 months ago
xDAuth: a scalable and lightweight framework for cross domain access control and delegation
Cross domain resource sharing and collaborations have become pervasive in today’s service oriented organizations. Existing approaches for the realization of cross domain access ...
Masoom Alam, Xinwen Zhang, Kamran Khan, Gohar Ali
SIGIR
2006
ACM
14 years 2 months ago
Adapting ranking SVM to document retrieval
The paper is concerned with applying learning to rank to document retrieval. Ranking SVM is a typical method of learning to rank. We point out that there are two factors one must ...
Yunbo Cao, Jun Xu, Tie-Yan Liu, Hang Li, Yalou Hua...