Sciweavers

1466 search results - page 276 / 294
» Completeness of the Authentication Tests
Sort
View
OPODIS
2003
13 years 9 months ago
Detecting Temporal Logic Predicates in Distributed Programs Using Computation Slicing
Detecting whether a finite execution trace (or a computation) of a distributed program satisfies a given predicate, called predicate detection, is a fundamental problem in distr...
Alper Sen, Vijay K. Garg
CASCON
1996
77views Education» more  CASCON 1996»
13 years 9 months ago
Harvesting design for an application framework
Framework design begins with domain analysis. Either the problem domain is analyzed to create a new design, or the solution domain is analyzed to understand how the problem has al...
Joan Boone
BILDMED
2009
128views Algorithms» more  BILDMED 2009»
13 years 8 months ago
Surface-Based Respiratory Motion Classification and Verification
To ensure precise tumor irradiation in radiotherapy a stable breathing pattern is mandatory as tumors are moving due to respiratory motion. Consequentially, irregularities of respi...
Kerstin Müller, Christian Schaller, Jochen Pe...
CLEF
2010
Springer
13 years 8 months ago
Fuzzy Semantic-Based String Similarity for Extrinsic Plagiarism Detection - Lab Report for PAN at CLEF 2010
This report explains our plagiarism detection method using fuzzy semantic-based string similarity approach. The algorithm was developed through four main stages. First is pre-proce...
Salha Alzahrani, Naomie Salim
CLEF
2009
Springer
13 years 8 months ago
Multilingual Query Expansion for CLEF Adhoc-TEL
In this paper we will briefly describe the approaches taken by the Cheshire (Berkeley) Group for the CLEF Adhoc-TEL 2009 tasks (Mono and Bilingual retrieval). Recognizing that man...
Ray R. Larson