Sciweavers

2342 search results - page 289 / 469
» A Methodology for Evaluating Software Engineering Methods an...
Sort
View
120
Voted
EUROSYS
2009
ACM
16 years 28 days ago
Pointless tainting?: evaluating the practicality of pointer tainting
This paper evaluates pointer tainting, an incarnation of Dynamic Information Flow Tracking (DIFT), which has recently become an important technique in system security. Pointer tai...
Asia Slowinska, Herbert Bos
MEDINFO
2007
126views Healthcare» more  MEDINFO 2007»
15 years 5 months ago
Knowledge Zone: A Public Repository of Peer-Reviewed Biomedical Ontologies
Reuse of ontologies is important for achieving better interoperability among health systems and relieving knowledge engineers from the burden of developing ontologies from scratch...
Kaustubh Supekar, Daniel L. Rubin, Natasha F. Noy,...
SENSYS
2009
ACM
15 years 10 months ago
Run time assurance of application-level requirements in wireless sensor networks
Continuous and reliable operation of WSNs is notoriously difficult to guarantee due to hardware degradation and environmental changes. In this paper, we propose and demonstrate a ...
Jingyuan Li, Yafeng Wu, Krasimira Kapitanova, John...
TASLP
2010
130views more  TASLP 2010»
14 years 10 months ago
Developing Objective Measures of Foreign-Accent Conversion
Various methods have recently appeared to transform foreign-accented speech into its native-accented counterpart. Evaluation of these accent conversion methods requires extensive l...
Daniel Felps, Ricardo Gutierrez-Osuna
160
Voted

Publication
352views
14 years 9 months ago
A Contourlet Transform Feature Extraction Scheme for Ultrasound Thyroid Texture Classification
Ultrasonography is an invaluable and widely used medical imaging tool. Nevertheless, automatic texture analysis on ultrasound images remains a challenging issue. This work presen...
Stamos Katsigiannis, Eystratios G. Keramidas, Dimi...