Sciweavers

1487 search results - page 263 / 298
» Two Kinds of Metonymy
Sort
View
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
14 years 1 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay
HVC
2005
Springer
183views Hardware» more  HVC 2005»
14 years 1 months ago
Detecting Potential Deadlocks with Static Analysis and Run-Time Monitoring
Concurrent programs are notorious for containing errors that are difficult to reproduce and diagnose. A common kind of concurrency error is deadlock, which occurs when a set of thr...
Rahul Agarwal, Liqiang Wang, Scott D. Stoller
MLCW
2005
Springer
14 years 1 months ago
Evaluating Predictive Uncertainty Challenge
This Chapter presents the PASCAL1 Evaluating Predictive Uncertainty Challenge, introduces the contributed Chapters by the participants who obtained outstanding results, and provide...
Joaquin Quiñonero Candela, Carl Edward Rasm...
OOPSLA
2005
Springer
14 years 1 months ago
Quantifying the performance of garbage collection vs. explicit memory management
Garbage collection yields numerous software engineering benefits, but its quantitative impact on performance remains elusive. One can compare the cost of conservative garbage col...
Matthew Hertz, Emery D. Berger
SCIA
2005
Springer
186views Image Analysis» more  SCIA 2005»
14 years 1 months ago
Levelset and B-Spline Deformable Model Techniques for Image Segmentation: A Pragmatic Comparative Study
Deformable contours are now widely used in image segmentation, using different models, criteria and numeric schemes. Some theoretical comparisons between few deformable model met...
Diane Lingrand, Johan Montagnat