Sciweavers

12635 search results - page 2285 / 2527
» Which semantic web
Sort
View
CCS
2008
ACM
15 years 6 months ago
BootJacker: compromising computers using forced restarts
BootJacker is a proof-of-concept attack tool which demonstrates that authentication mechanisms employed by an operating system can be bypassed by obtaining physical access and sim...
Ellick Chan, Jeffrey C. Carlyle, Francis M. David,...
CIMCA
2006
IEEE
15 years 6 months ago
Identification of Document Language is Not yet a Completely Solved Problem
Existing Language Identification (LID) approaches do reach 100% precision, in most common situations, when dealing with documents written in just one language, and when those docu...
Joaquim Ferreira da Silva, Gabriel Pereira Lopes
CSCW
2008
ACM
15 years 6 months ago
Social summarization: does social feedback improve access to speech data?
We extend the notion of social tagging to construct social summaries of complex multimedia materials. Our system allows students to apply time-indexed multimedia tags such as hand...
Vaiva Kalnikaité, Steve Whittaker
EUC
2007
Springer
15 years 6 months ago
U-Interactive: A Middleware for Ubiquitous Fashionable Computer to Interact with the Ubiquitous Environment by Gestures
In this paper we present a system, called U-interactive, that provides spontaneous interactions between human and surrounding objects in heterogenous ubiquitous computing environme...
Gyudong Shim, SangKwon Moon, Yong Song, JaeSub Kim...
CSCWD
2008
Springer
15 years 6 months ago
CEBON: Collaborative estimation based on negotiation
: The Software Engineering community has been trying to get fast and accurate software estimations for many years. Most of the proposed methods require historical information and/o...
Fabian Poblete, José A. Pino, Sergio F. Och...
« Prev « First page 2285 / 2527 Last » Next »