Sciweavers

11718 search results - page 2271 / 2344
» Testing database applications
Sort
View
SENSYS
2009
ACM
14 years 2 months ago
The case for a network protocol isolation layer
Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures fro...
Jung Il Choi, Maria A. Kazandjieva, Mayank Jain, P...
WSDM
2009
ACM
138views Data Mining» more  WSDM 2009»
14 years 2 months ago
Adaptive subjective triggers for opinionated document retrieval
This paper proposes a novel application of a statistical language model to opinionated document retrieval targeting weblogs (blogs). In particular, we explore the use of the trigg...
Kazuhiro Seki, Kuniaki Uehara
LCTRTS
2009
Springer
14 years 2 months ago
Addressing the challenges of DBT for the ARM architecture
Dynamic binary translation (DBT) can provide security, virtualization, resource management and other desirable services to embedded systems. Although DBT has many benefits, its r...
Ryan W. Moore, José Baiocchi, Bruce R. Chil...
ICAS
2009
IEEE
168views Robotics» more  ICAS 2009»
14 years 2 months ago
Impact of Video Content on Video Quality for Video over Wireless Networks
—Video streaming is a promising multimedia application and is gaining popularity over wireless/mobile communications. The quality of the video depends heavily on the type of cont...
Asiya Khan, Lingfen Sun, Emmanuel C. Ifeachor
ICASSP
2009
IEEE
14 years 2 months ago
Data hiding in hard-copy text documents robust to print, scan and photocopy operations
This paper describes a method for hiding data inside printed text documents that is resilient to print/scan and photocopying operations. Using the principle of channel coding with...
Avinash L. Varna, Shantanu Rane, Anthony Vetro
« Prev « First page 2271 / 2344 Last » Next »