Sciweavers

28888 search results - page 5757 / 5778
» Computability and complexity in analysis
Sort
View
ISSRE
2010
IEEE
13 years 7 months ago
Is Data Privacy Always Good for Software Testing?
—Database-centric applications (DCAs) are common in enterprise computing, and they use nontrivial databases. Testing of DCAs is increasingly outsourced to test centers in order t...
Mark Grechanik, Christoph Csallner, Chen Fu, Qing ...
JCST
2010
119views more  JCST 2010»
13 years 7 months ago
Location, Localization, and Localizability
Abstract Location-aware technology spawns numerous unforeseen pervasive applications in a wide range of living, production, commence, and public services. This article provides an ...
Yunhao Liu, Zheng Yang, Xiaoping Wang, Lirong Jian
JSYML
2010
107views more  JSYML 2010»
13 years 7 months ago
A proof of completeness for continuous first-order logic
Continuous first-order logic has found interest among model theorists who wish to extend the classical analysis of “algebraic” structures (such as fields, group, and graphs) ...
Arthur Paul Pedersen, Itay Ben-Yaacov
P2P
2010
IEEE
132views Communications» more  P2P 2010»
13 years 7 months ago
Towards Plugging Privacy Leaks in the Domain Name System
—Privacy leaks are an unfortunate and an integral part of the current Internet domain name resolution. Each DNS query generated by a user reveals – to one or more DNS servers ...
Yanbin Lu, Gene Tsudik
PAMI
2010
417views more  PAMI 2010»
13 years 7 months ago
Auto-Context and Its Application to High-Level Vision Tasks and 3D Brain Image Segmentation
The notion of using context information for solving high-level vision and medical image segmentation problems has been increasingly realized in the field. However, how to learn a...
Zhuowen Tu, Xiang Bai
« Prev « First page 5757 / 5778 Last » Next »