Sciweavers

3338 search results - page 616 / 668
» Assigning Papers to Referees
Sort
View
ACMSE
2004
ACM
14 years 1 months ago
Trust based adaptive on demand ad hoc routing protocol
In this paper, we propose a routing protocol that is based on securing the routing information from unauthorized users. Even though routing protocols of this category are already ...
Rajiv K. Nekkanti, Chung-wei Lee
ISSTA
2004
ACM
14 years 1 months ago
An experimental evaluation of continuous testing during development
Continuous testing uses excess cycles on a developer’s workstation to continuously run regression tests in the background, providing rapid feedback about test failures as source...
David Saff, Michael D. Ernst
JCDL
2004
ACM
134views Education» more  JCDL 2004»
14 years 1 months ago
Exploring the relationship between personal and public annotations
Today people typically read and annotate printed documents even if they are obtained from electronic sources like digital libraries. If there is a reason for them to share these p...
Catherine C. Marshall, A. J. Bernheim Brush
MM
2004
ACM
86views Multimedia» more  MM 2004»
14 years 1 months ago
Efficient propagation for face annotation in family albums
In this paper, we propose and investigate a new user scenario for face annotation, in which users are allowed to multi-select a group of photographs and assign names to these phot...
Lei Zhang, Yuxiao Hu, Mingjing Li, Wei-Ying Ma, Ho...
PASTE
2004
ACM
14 years 1 months ago
Resolving and applying constraint queries on context-sensitive analyses
A context-sensitive analysis is an analysis in which program elements are assigned sets of properties that depend upon the context in which they occur. For analyses on imperative ...
James Ezick