Sciweavers

2006 search results - page 279 / 402
» Heuristic Security-Testing Methods
Sort
View
NLPRS
2001
Springer
14 years 2 months ago
An Empirical Study of Feature Set Selection for Text Chunking
This paper presents an empirical study for improving the performance of text chunking. We focus on two issues: the problem of selecting feature spaces, and the problem of alleviat...
Young-Sook Hwang, Yong-Jae Kwak, Hoo-Jung Chung, S...
DATE
2000
IEEE
88views Hardware» more  DATE 2000»
14 years 2 months ago
Free MDD-Based Software Optimization Techniques for Embedded Systems
Embedded systems make a heavy use of software to perform Real-Time embedded control tasks. Embedded software is characterized by a relatively long lifetime and by tight cost, perf...
Chunghee Kim, Luciano Lavagno, Alberto L. Sangiova...
ICCAD
2000
IEEE
138views Hardware» more  ICCAD 2000»
14 years 2 months ago
Fast Analysis and Optimization of Power/Ground Networks
This paper presents an efficient method for optimizing power/ground (P/G) networks by widening wires and adding decoupling capacitors (decaps). It proposes a structured skeleton t...
Haihua Su, Kaushik Gala, Sachin S. Sapatnekar
INFOCOM
2000
IEEE
14 years 2 months ago
On the Placement of Internet Instrumentation
— The IDMaps project aims to provide a distance map of the Internet from which relative distances between hosts on the Internet can be gauged [1]. Many distributed systems and ap...
Sugih Jamin, Cheng Jin, Yixin Jin, Danny Raz, Yuva...
CVPR
2010
IEEE
14 years 2 months ago
Refinement of Digital Elevation Models from Shadowing Cues
In this paper we derive formal constraints relating terrain elevation and observed cast shadows. We show how an optimisation framework can be used to refine surface estimates usin...
James Hogan, William Smith