Sciweavers

1057 search results - page 127 / 212
» its 1998
Sort
View
ACSAC
1998
IEEE
14 years 2 months ago
Role-Based Access Control Framework for Network Enterprises
A business's success depends on its ability to protect valuable business assets in an increasingly hostile environment. Protecting information requires a cost, not only in pu...
D. J. Thomsen, D. O'Brien, J. Bogle
ASYNC
1998
IEEE
122views Hardware» more  ASYNC 1998»
14 years 2 months ago
A Fast Asynchronous Huffman Decoder for Compressed-Code Embedded Processors
This paper presents the architecture and design of a high-performance asynchronous Huffman decoder for compressed-code embedded processors. In such processors, embedded programs a...
Martin Benes, Steven M. Nowick, Andrew Wolfe
CBMS
1998
IEEE
14 years 2 months ago
Lexicon Assistance Reduces Manual Verification of OCR Output
An OCR system chosen for its high recognition rate and low percent of false positives also assigns low confidence values to many characters that are actually correct. Human operat...
Susan E. Hauser, A. C. Browne, George R. Thoma, Al...
CSMR
1998
IEEE
14 years 2 months ago
A Method for Assessing Legacy Systems for Evolution
Legacy systems are usually critical to the business in which they operate, but the costs of running them are often not justifiable. Determining whether such systems are worth keep...
Jane Ransom, Ian Sommerville, Ian Warren
DCC
1998
IEEE
14 years 2 months ago
The Context Trees of Block Sorting Compression
Abstract. The Burrows-Wheeler transform (BWT) and block sorting compression are closely related to the context trees of PPM. The usual approach of treating BWT as merely a permutat...
N. Jesper Larsson