Sciweavers

15375 search results - page 3006 / 3075
» cans 2008
Sort
View
140
Voted
AIMSA
2008
Springer
15 years 11 months ago
Using Text Segmentation to Enhance the Cluster Hypothesis
An alternative way to tackle Information Retrieval, called Passage Retrieval, considers text fragments independently rather than assessing global relevance of documents. In such a ...
Sylvain Lamprier, Tassadit Amghar, Bernard Levrat,...
CIS
2008
Springer
15 years 10 months ago
Multiperspective Modeling and Rendering Using General Linear Cameras
We present a General Linear Camera (GLC) model that unifies many previous camera models into a single representation. The GLC model is capable of describing all perspective (pinhol...
Jingyi Yu, Yuanyuan Ding, and Leonard McMillan
WWW
2010
ACM
15 years 9 months ago
Reining in the web with content security policy
The last three years have seen a dramatic increase in both awareness and exploitation of Web Application Vulnerabilities. 2008 and 2009 saw dozens of high-profile attacks against...
Sid Stamm, Brandon Sterne, Gervase Markham
DESRIST
2009
Springer
125views Education» more  DESRIST 2009»
15 years 9 months ago
An empirical evaluation of information security awareness levels in designing secure business processes
Information Systems Security (ISS) is critical to ensuring the integrity and credibility of digitally exchanged information in business processes. Information systems development ...
Fergle D'Aubeterre, Lakshmi S. Iyer, Rahul Singh
ICPIA
1992
15 years 8 months ago
Intelligent Pattern Recognition and Applications
:: This talk deals with fundamental aspects of Intelligent Pattern Recognition (IPR) and applications. It basically includes the following: Overview of 3D Biometric Technology and ...
Patrick Shen-Pei Wang
« Prev « First page 3006 / 3075 Last » Next »