Sciweavers

762 search results - page 37 / 153
» A study of the uniqueness of source code
Sort
View
ICDAR
2009
IEEE
14 years 3 months ago
Shape Encoded Post Processing of Gurmukhi OCR
A post-processor is an integral part of any OCR system. This paper proposes a method for detection and correction of errors in recognition results of handwritten and machine print...
Dharam Veer Sharma, Gurpreet Singh Lehal, Sarita M...
DSN
2006
IEEE
14 years 3 months ago
Accurate and Automated System Call Policy-Based Intrusion Prevention
One way to prevent control hijacking attack is to compare a network application’s run-time system calls with a pre-defined normal system call behavior model, and raise an alert...
Lap-Chung Lam, Wei Li, Tzi-cker Chiueh
ECOOP
2011
Springer
12 years 8 months ago
An Empirical Study of Object Protocols in the Wild
Abstract. An active area of research in computer science is the prevention of violations of object protocols, i.e., restrictions on temporal orderings of method calls on an object....
Nels E. Beckman, Duri Kim, Jonathan Aldrich
ICSM
2007
IEEE
14 years 3 months ago
Release Pattern Discovery: A Case Study of Database Systems
Studying the release-time activities of a software project — that is, activities that occur around the time of a major or minor release — can provide insights into both the de...
Abram Hindle, Michael W. Godfrey, Richard C. Holt
DCC
2006
IEEE
14 years 8 months ago
Adaptive Run-Length / Golomb-Rice Encoding of Quantized Generalized Gaussian Sources with Unknown Statistics
We present a simple and efficient entropy coder that combines run-length and Golomb-Rice encoders. The encoder automatically switches between the two modes according to simple rul...
Henrique S. Malvar