Sciweavers

1734 search results - page 293 / 347
» What works
Sort
View
AIRWEB
2009
Springer
14 years 4 months ago
Tag spam creates large non-giant connected components
Spammers in social bookmarking systems try to mimick bookmarking behaviour of real users to gain the attention of other users or search engines. Several methods have been proposed...
Nicolas Neubauer, Robert Wetzker, Klaus Obermayer
WEBDB
2009
Springer
172views Database» more  WEBDB 2009»
14 years 4 months ago
PrivatePond: Outsourced Management of Web Corpuses
With the rise of cloud computing, it is increasingly attractive for end-users (organizations and individuals) to outsource the management of their data to a small number of larges...
Daniel Fabbri, Arnab Nandi, Kristen LeFevre, H. V....
WOLLIC
2009
Springer
14 years 4 months ago
Ludics and Its Applications to Natural Language Semantics
Abstract. Proofs in Ludics, have an interpretation provided by their counter-proofs, that is the objects they interact with. We shall follow the same idea by proposing that sentenc...
Alain Lecomte, Myriam Quatrini
EFORENSICS
2009
Springer
14 years 4 months ago
Vocal Forgery in Forensic Sciences
Abstract. This article describes techniques of vocal forgery able to affect automatic speaker recognition system in a forensic context. Vocal forgery covers two main aspects: voice...
Patrick Perrot, Mathieu Morel, Joseph Razik, G&eac...
EUROSSC
2009
Springer
14 years 4 months ago
Time-Lag as Limiting Factor for Indoor Walking Navigation
Several navigation situations can be imagined where visual cueing is not practical or unfeasible, and where the hands are required exclusively for a certain task. The utilization o...
Andreas Riener, Markus Straub, Alois Ferscha