Sciweavers

CORR
2010
Springer
61views Education» more  CORR 2010»
13 years 7 months ago
Utility and Privacy of Data Sources: Can Shannon Help Conceal and Reveal Information?
Abstract-- The problem of private information "leakage" (inadvertently or by malicious design) from the myriad large centralized searchable data repositories drives the n...
Lalitha Sankar, S. Raj Rajagopalan, H. Vincent Poo...
CORR
2010
Springer
107views Education» more  CORR 2010»
13 years 7 months ago
The Influence of Intensity Standardization on Medical Image Registration
Ulas Bagci, Jayaram K. Udupa, Li Bai
CORR
2010
Springer
177views Education» more  CORR 2010»
13 years 7 months ago
Understanding Formulation of Social Capital in Online Social Network Sites (SNS)
Online communities are the gatherings of like-minded people, brought together in cyberspace by shared interests. The shared interest has hidden social capital aspects and can be o...
S. S. Phulari, S. D. Khamitkar, N. K. Deshmukh, P....
CORR
2010
Springer
171views Education» more  CORR 2010»
13 years 7 months ago
Reliable Mining of Automatically Generated Test Cases from Software Requirements Specification (SRS)
Writing requirements is a two-way process. In this paper we use to classify Functional Requirements (FR) and Non Functional Requirements (NFR) statements from Software Requirement...
Lilly Raamesh, G. V. Uma
CORR
2010
Springer
138views Education» more  CORR 2010»
13 years 7 months ago
ICT in Universities of the Western Himalayan Region of India II: A Comparative SWOT Analysis
This study presents a comparative SWOT analysis to comprehend the pattern of development of ICT within six universities of western Himalayan region of India. With the objective of...
Dhirendra Sharma, Vikram Singh
CORR
2010
Springer
94views Education» more  CORR 2010»
13 years 7 months ago
Unidirectional Error Correcting Codes for Memory Systems: A Comparative Study
In order to achieve fault tolerance, highly reliable system often require the ability to detect errors as soon as they occur and prevent the speared of erroneous information throu...
Muzhir Al-Ani, Qeethara Al-Shayea
CORR
2010
Springer
150views Education» more  CORR 2010»
13 years 7 months ago
Framework for Visualizing Model-Driven Software Evolution and its Application
Software Visualization encompasses the development and evaluation of methods for graphically representing different aspects of methods of software, including its structure, execut...
Akepogu Anand Rao, Karanam Madhavi
CORR
2010
Springer
186views Education» more  CORR 2010»
13 years 7 months ago
Significant Interval and Frequent Pattern Discovery in Web Log Data
There is a considerable body of work on sequence mining of Web Log Data We are using One Pass frequent Episode discovery (or FED) algorithm, takes a different approach than the tr...
Kanak Saxena, Rahul Shukla
CORR
2010
Springer
90views Education» more  CORR 2010»
13 years 7 months ago
RFID Applications: An Introductory and Exploratory Study
RFID is not a new technology and has passed through many decades of use in military, airline, library, security, healthcare, sports, animal farms and other areas. Industries use R...
Kamran Ahsan, Hanifa Shah, Paul Kingston
CORR
2010
Springer
153views Education» more  CORR 2010»
13 years 7 months ago
Adaptation of TURN protocol to SIP protocol
Today, SIP is a protocol par Excellence in the field of communication over Internet. But, the fact that it belongs to the application layer constitutes a weakness vis-
Mustapha Guezouri, Ahmed Blaha, Mokhtar Keche