Sciweavers

1585 search results - page 213 / 317
» Automatically optimizing secure computation
Sort
View
CSCW
2011
ACM
13 years 2 months ago
Scheduling in variable-core collaborative systems
The performance of a collaborative system depends on how two mandatory collaborative tasks, processing and transmission of user commands, are scheduled. We have developed multiple...
Sasa Junuzovic, Prasun Dewan
GECCO
2007
Springer
174views Optimization» more  GECCO 2007»
14 years 2 months ago
Investigating data-flow coverage of classes using evolutionary algorithms
It is not unusual for a software development organization to expend 40 percent of total project effort on testing, which can be a very laborious and time-consuming process. Thus, ...
Konstantinos Liaskos, Marc Roper, Murray Wood
IJCNLP
2005
Springer
14 years 1 months ago
Using Multiple Discriminant Analysis Approach for Linear Text Segmentation
Research on linear text segmentation has been an on-going focus in NLP for the last decade, and it has great potential for a wide range of applications such as document summarizati...
Jingbo Zhu, Na Ye, Xinzhi Chang, Wenliang Chen, Be...
WWW
2009
ACM
14 years 9 months ago
Cascading style sheets: a novel approach towards productive styling with today's standards
In this paper we present an approach of generating Cascading Style Sheet documents automatically if the desired effect on the content elements is specified. While a Web user agent...
Matthias Keller, Martin Nussbaumer
ICDAR
2007
IEEE
14 years 2 months ago
Global Contour Lines Reconstruction in Topographic Maps
Topographic maps are a common support for geographical information because they have the particularity to portray the relief through a set of contour lines. This topographic featu...
Joachim Pouderoux, Salvatore Spinello