Sciweavers

2678 search results - page 118 / 536
» Comparative Evaluation of Approaches to Propositionalization
Sort
View
FI
2011
96views more  FI 2011»
13 years 3 months ago
A Distributed Public Key Infrastructure Based on Threshold Cryptography for the HiiMap Next Generation Internet Architecture
: In this article, a security extension for the HiiMap Next Generation Internet Architecture is presented. We regard a public key infrastructure which is integrated into the mappin...
Oliver Hanka, Michael Eichhorn, Martin Pfannenstei...
IJDAR
2011
143views more  IJDAR 2011»
13 years 3 months ago
Grammar-based techniques for creating ground-truthed sketch corpora
Although publicly-available, ground-truthed corpora have proven useful for training, evaluating, and comparing recognition systems in many domains, the availability of such corpor...
Scott MacLean, George Labahn, Edward Lank, Mirette...
ICSE
2008
IEEE-ACM
14 years 9 months ago
An approach to detecting duplicate bug reports using natural language and execution information
An open source project typically maintains an open bug repository so that bug reports from all over the world can be gathered. When a new bug report is submitted to the repository...
Xiaoyin Wang, Lu Zhang, Tao Xie, John Anvik, Jiasu...
IPPS
2009
IEEE
14 years 2 months ago
A resource allocation approach for supporting time-critical applications in grid environments
— There are many grid-based applications where a timely response to an important event is needed. Often such response can require a significant computation and possibly communic...
Qian Zhu, Gagan Agrawal
DICTA
2009
13 years 6 months ago
Refining Local 3D Feature Matching through Geometric Consistency for Robust Biometric Recognition
Local features are gaining popularity due to their robustness to occlusion and other variations such as minor deformation. However, using local features for recognition of biometri...
Syed M. S. Islam, Rowan Davies