Sciweavers

1276 search results - page 229 / 256
» Vetting the links of the web
Sort
View
JUCS
2010
154views more  JUCS 2010»
13 years 8 months ago
An Ambient Assisted Living Platform Integrating RFID Data-on-Tag Care Annotations and Twitter
: Although RFID is mainly used to identify objects whose data can then be accessed over the network, passive HF RFID tags do have significant data storage capacity (up to 4K), whic...
Diego López-de-Ipiña, Ignacio D&iacu...
MTA
2010
101views more  MTA 2010»
13 years 8 months ago
Enquiring MPEG-7 based multimedia ontologies
Machine understandable metadata forms the main prerequisite for the intelligent services envisaged in a Web, which going beyond mere data exchange and provides for effective conten...
Stamatia Dasiopoulou, Vassilis Tzouvaras, Ioannis ...
SAS
2010
Springer
141views Formal Methods» more  SAS 2010»
13 years 8 months ago
Statically Inferring Complex Heap, Array, and Numeric Invariants
We describe Deskcheck, a parametric static analyzer that is able to establish properties of programs that manipulate dynamically allocated memory, arrays, and integers. Deskcheck c...
Bill McCloskey, Thomas W. Reps, Mooly Sagiv
EMNLP
2010
13 years 7 months ago
What's with the Attitude? Identifying Sentences with Attitude in Online Discussions
Mining sentiment from user generated content is a very important task in Natural Language Processing. An example of such content is threaded discussions which act as a very import...
Ahmed Hassan, Vahed Qazvinian, Dragomir R. Radev
EMNLP
2010
13 years 7 months ago
Practical Linguistic Steganography Using Contextual Synonym Substitution and Vertex Colour Coding
Linguistic Steganography is concerned with hiding information in natural language text. One of the major transformations used in Linguistic Steganography is synonym substitution. ...
Ching-Yun Chang, Stephen Clark