Sciweavers

956 search results - page 82 / 192
» Slicing Objects Using System Dependence Graphs
Sort
View
MM
2004
ACM
97views Multimedia» more  MM 2004»
14 years 3 months ago
Security of human video objects by incorporating a chaos-based feedback cryptographic scheme
Security of multimedia files attracts more and more attention and many encryption methods have been proposed in literature. However most cryptographic systems deal with multimedia...
Paraskevi K. Tzouveli, Klimis S. Ntalianis, Stefan...
CN
2008
108views more  CN 2008»
13 years 10 months ago
Finding a dense-core in Jellyfish graphs
The connectivity of the Internet crucially depends on the relationships between thousands of Autonomous Systems (ASes) that exchange routing information using the Border Gateway P...
Mira Gonen, Dana Ron, Udi Weinsberg, Avishai Wool
FLAIRS
2010
14 years 10 days ago
Handling of Numeric Ranges for Graph-Based Knowledge Discovery
Nowadays, graph-based knowledge discovery algorithms do not consider numeric attributes (they are discarded in the preprocessing step, or they are treated as alphanumeric values w...
Oscar E. Romero, Jesus A. Gonzalez, Lawrence B. Ho...
IWMM
2007
Springer
85views Hardware» more  IWMM 2007»
14 years 4 months ago
Uniqueness inference for compile-time object deallocation
This paper presents an analysis and transformation for individual object reclamation in Java programs. First, we propose a uniqueness inference algorithm that identifies variable...
Sigmund Cherem, Radu Rugina
HICSS
2007
IEEE
118views Biometrics» more  HICSS 2007»
14 years 4 months ago
Introducing Executable Product Models for the Service Industry
In these days, companies need highly flexible processes to deal with changing environments and competitors. Using traditional process models that have to be modeled in all detail...
Markus Kress, Joachim Melcher, Detlef Seese