Sciweavers

4095 search results - page 535 / 819
» How to test a tree
Sort
View
133
Voted
TISSEC
2002
82views more  TISSEC 2002»
15 years 3 months ago
Trust management for IPsec
IPsec is the standard suite of protocols for networklayer confidentiality and authentication of Internet traffic. The IPsec protocols, however, do not address the policies for how...
Matt Blaze, John Ioannidis, Angelos D. Keromytis
131
Voted
SAC
2008
ACM
15 years 3 months ago
Extending omniscient debugging to support aspect-oriented programming
Debugging is a tedious and costly process that demands a profound understanding of the dynamic behavior of programs. Debugging aspect-oriented software is even more difficult: to ...
Guillaume Pothier, Éric Tanter
129
Voted
ISVC
2010
Springer
15 years 2 months ago
Image Enhancement by Median Filters in Algebraic Reconstruction Methods: An Experimental Study
Algebraic methods for image reconstruction provide good solutions even if only few projections are available. However, they can create noisy images if the number of iterations or t...
Norbert Hantos, Péter Balázs
JETAI
2010
56views more  JETAI 2010»
15 years 2 months ago
Warning: statistical benchmarking is addictive. Kicking the habit in machine learning
Algorithm performance evaluation is so entrenched in the Machine Learning community that one could call it an addiction. Like most addictions, it is harmful and very difficult to ...
Chris Drummond, Nathalie Japkowicz
122
Voted
PERCOM
2010
ACM
15 years 2 months ago
Measuring mobile phone energy consumption for 802.11 wireless networking
The complexity of modern mobile phones makes it difficult for developers to understand the power consumption of their applications. Our measurement framework produces fine-graine...
Andrew Colin Rice, Simon Hay