Sciweavers

1190 search results - page 114 / 238
» You are There
Sort
View
SADFE
2010
IEEE
13 years 6 months ago
Fonts for Forensics
: Like other latent evidence that cannot be directly perceived by people, bit sequences have to be presented through tools. Presentations of digital forensic evidence often involve...
Fred Cohen
ACL
2009
13 years 6 months ago
An Integrated Multi-document Summarization Approach based on Word Hierarchical Representation
This paper introduces a novel hierarchical summarization approach for automatic multidocument summarization. By creating a hierarchical representation of the words in the input do...
Ouyang You, Wenjie Li, Qin Lu
BWCCA
2010
13 years 3 months ago
Malware Obfuscation Techniques: A Brief Survey
As the obfuscation is widely used by malware writers to evade antivirus scanners, so it becomes important to analyze how this technique is applied to malwares. This paper explores ...
Ilsun You, Kangbin Yim
MC
2003
170views Computer Science» more  MC 2003»
13 years 9 months ago
Social navigation: from the web to the mobile
Social navigation is the alternative way of looking upon navigation in the virtual world: e g instead of navigating the web by maps and hierarchies and search engines, you would n...
Kristina Höök