Sciweavers

672 search results - page 59 / 135
» An assessment of tag presentation techniques
Sort
View
NCA
2008
IEEE
14 years 2 months ago
Finite Memory: A Vulnerability of Intrusion-Tolerant Systems
In environments like the Internet, faults follow unusual patterns, dictated by the combination of malicious attacks with accidental faults such as long communication delays caused...
Giuliana Santos Veronese, Miguel Correia, Lau Cheu...
ECLIPSE
2006
ACM
14 years 1 months ago
FrUiT: IDE support for framework understanding
Frameworks provide means to reuse existing design and functionality, but first require developers to understand how to use them. Learning the correct usage of a framework can be ...
Marcel Bruch, Thorsten Schäfer, Mira Mezini
DAC
1998
ACM
14 years 16 hour ago
Adjoint Transient Sensitivity Computation in Piecewise Linear Simulation
This paper presents a general method for computing transient sensitivities using the adjoint method in event driven simulation algorithms that employ piecewise linear device model...
Tuyen V. Nguyen, Anirudh Devgan, Ognen J. Nastov
NAACL
1994
13 years 9 months ago
Automatic Evaluation of Computer Generated Text: A Progress Report on the TEXTEVAL Project
We present results ofexperiments designed to assess the usefulness of a new technique for the evaluation of translation quality, comparing human rankings with automatic measures. ...
Chris Brew, Henry S. Thompson
ICIP
2007
IEEE
14 years 9 months ago
Lossless Image Compression and Selective Encryption using a Discrete Radon Transform
In this paper we propose a new joint encryption and lossless compression technique designed for large images 1 . The proposed technique takes advantage of the Mojette transform pr...
Andrew Kingston, Simone Colosimo, Patrizio Campisi...