Sciweavers

1466 search results - page 268 / 294
» Completeness of the Authentication Tests
Sort
View
ICSM
2002
IEEE
14 years 19 days ago
Constraining Software Evolution
Software is multidimensional but the tools that support it are not. The lack of tool support causes the software artifacts representing different dimensions to evolve independentl...
Steven P. Reiss
INFOCOM
2002
IEEE
14 years 19 days ago
Topologically-Aware Overlay Construction and Server Selection
— A number of large-scale distributed Internet applications could potentially benefit from some level of knowledge about the relative proximity between its participating host no...
Sylvia Ratnasamy, Mark Handley, Richard M. Karp, S...
CIVR
2010
Springer
199views Image Analysis» more  CIVR 2010»
14 years 15 days ago
Unsupervised multi-feature tag relevance learning for social image retrieval
Interpreting the relevance of a user-contributed tag with respect to the visual content of an image is an emerging problem in social image retrieval. In the literature this proble...
Xirong Li, Cees G. M. Snoek, Marcel Worring
IWMM
2010
Springer
173views Hardware» more  IWMM 2010»
14 years 14 days ago
CETS: compiler enforced temporal safety for C
Temporal memory safety errors, such as dangling pointer dereferences and double frees, are a prevalent source of software bugs in unmanaged languages such as C. Existing schemes t...
Santosh Nagarakatte, Jianzhou Zhao, Milo M. K. Mar...
SIGGRAPH
2000
ACM
14 years 2 days ago
Conservative visibility preprocessing using extended projections
Visualization of very complex scenes can be significantly accelerated using occlusion culling. In this paper we present a visibility preprocessing method which efficiently compu...
Frédo Durand, George Drettakis, Joëlle...