Sciweavers

460 search results - page 55 / 92
» Using Foreign Forums
Sort
View
SIGIR
2008
ACM
13 years 9 months ago
Spoken content retrieval: Searching spontaneous conversational speech
The second workshop on Searching Spontaneous Conversational Speech (SSCS 2008) was held in Singapore on July 24, 2008 in conjunction with the 31st Annual International ACM SIGIR C...
Joachim Köhler, Martha Larson, Franciska de J...
CHI
2002
ACM
14 years 10 months ago
Visible or invisible links?
This article investigates how the signaling-mode of electronic glosses in online texts (i.e., presented digitally on a computer screen) influences the user's reading process,...
Isabelle De Ridder
ICCD
2004
IEEE
97views Hardware» more  ICCD 2004»
14 years 6 months ago
Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution
1 Many computer security threats involve execution of unauthorized foreign code on the victim computer. Viruses, network and email worms, Trojan horses, backdoor programs used in ...
A. Murat Fiskiran, Ruby B. Lee
WEBDB
2009
Springer
130views Database» more  WEBDB 2009»
14 years 4 months ago
A Referential Integrity Browser for Distributed Databases
We demonstrate a program that can inspect a distributed relational database on the Internet to discover and quantify referential integrity issues for integration purposes. The pro...
Carlos Ordonez, Javier García-García...
CEC
2008
IEEE
14 years 4 months ago
Social learning in Population-based Adaptive Systems
— The subject of the present investigation is Population-based Adaptive Systems (PAS), as implemented in the NEW TIES platform. In many existing PASs two adaptation mechanisms ar...
Evert Haasdijk, Paul Vogt, A. E. Eiben