Sciweavers

889 search results - page 69 / 178
» Analysis of Software Engineering Data Using Computational In...
Sort
View
IAT
2003
IEEE
14 years 2 months ago
Person Name Identification in Chinese Documents Using Finite State Automata
This research is about automatic identification and extraction of person names in Chinese text documents. Solutions to this problem have immediate and extensive applications in ma...
Bing Shen, Zhongfei (Mark) Zhang, Chunfa Yuan
DRM
2006
Springer
14 years 13 days ago
Proteus: virtualization for diversified tamper-resistance
Despite huge efforts by software providers, software protection mechanisms are still broken on a regular basis. Due to the current distribution model, an attack against one copy o...
Bertrand Anckaert, Mariusz H. Jakubowski, Ramarath...
KBSE
2005
IEEE
14 years 2 months ago
Locating faulty code using failure-inducing chops
Software debugging is the process of locating and correcting faulty code. Prior techniques to locate faulty code either use program analysis techniques such as backward dynamic pr...
Neelam Gupta, Haifeng He, Xiangyu Zhang, Rajiv Gup...
DRM
2007
Springer
14 years 2 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan
BMCBI
2005
98views more  BMCBI 2005»
13 years 8 months ago
InterferenceAnalyzer: Tools for the analysis and simulation of multi-locus genetic data
Background: Good statistical models for analyzing and simulating multilocus recombination data exist but are not accessible to many biologists because their use requires reasonabl...
Lalitha Viswanath, Elizabeth A. Housworth