Sciweavers

1466 search results - page 268 / 294
» Completeness of the Authentication Tests
Sort
View
ICSM
2002
IEEE
15 years 9 months ago
Constraining Software Evolution
Software is multidimensional but the tools that support it are not. The lack of tool support causes the software artifacts representing different dimensions to evolve independentl...
Steven P. Reiss
INFOCOM
2002
IEEE
15 years 9 months ago
Topologically-Aware Overlay Construction and Server Selection
— A number of large-scale distributed Internet applications could potentially benefit from some level of knowledge about the relative proximity between its participating host no...
Sylvia Ratnasamy, Mark Handley, Richard M. Karp, S...
CIVR
2010
Springer
199views Image Analysis» more  CIVR 2010»
15 years 8 months ago
Unsupervised multi-feature tag relevance learning for social image retrieval
Interpreting the relevance of a user-contributed tag with respect to the visual content of an image is an emerging problem in social image retrieval. In the literature this proble...
Xirong Li, Cees G. M. Snoek, Marcel Worring
IWMM
2010
Springer
173views Hardware» more  IWMM 2010»
15 years 8 months ago
CETS: compiler enforced temporal safety for C
Temporal memory safety errors, such as dangling pointer dereferences and double frees, are a prevalent source of software bugs in unmanaged languages such as C. Existing schemes t...
Santosh Nagarakatte, Jianzhou Zhao, Milo M. K. Mar...
SIGGRAPH
2000
ACM
15 years 8 months ago
Conservative visibility preprocessing using extended projections
Visualization of very complex scenes can be significantly accelerated using occlusion culling. In this paper we present a visibility preprocessing method which efficiently compu...
Frédo Durand, George Drettakis, Joëlle...