Sciweavers

20807 search results - page 4118 / 4162
» How to read a paper
Sort
View
IJDET
2010
123views more  IJDET 2010»
13 years 6 months ago
An Adaptive Course Generation Framework
: Existing adaptive e-learning methods are supported by student (user) profiling for capturing student characteristics, and course structuring for organizing learning materials acc...
Frederick W. B. Li, Rynson W. H. Lau, Parthiban Dh...
IJSSE
2010
80views more  IJSSE 2010»
13 years 6 months ago
Improving Memory Management Security for C and C++
Memory managers are an important part of any modern language: they are used to dynamically allocate memory for use in the program. Many managers exist and depending on the operati...
Yves Younan, Wouter Joosen, Frank Piessens, Hans V...
ISF
2010
273views more  ISF 2010»
13 years 6 months ago
Agents of responsibility - freelance web developers in web applications development
Much of the literature on responsibility in the IT field addresses the responsibilities of members of the IT profession. In this paper, we investigate to what extent the responsibi...
Malik Aleem Ahmed, Jeroen van den Hoven
DBSEC
2010
196views Database» more  DBSEC 2010»
13 years 5 months ago
Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance
Abstract. This paper describes how to preserve integrity and confidentiality of a directed acyclic graph (DAG) model of provenance database. We show a method to preserve integrity ...
Amril Syalim, Takashi Nishide, Kouichi Sakurai
CVPR
2011
IEEE
13 years 5 months ago
Natural Image Denoising: Optimality and Inherent Bounds
The goal of natural image denoising is to estimate a clean version of a given noisy image, utilizing prior knowledge on the statistics of natural images. The problem has been stud...
Anat Levin, Boaz Nadler
« Prev « First page 4118 / 4162 Last » Next »