Sciweavers

ACSC
2006
IEEE
13 years 10 months ago
Constructing real-time collaborative software engineering tools using CAISE, an architecture for supporting tool development
Real-time Collaborative Software Engineering (CSE) tools have many perceived benefits including increased programmer communication and faster resolution of development conflicts...
Carl Cook, Neville Churcher
ACSC
2006
IEEE
13 years 10 months ago
Modelling layer 2 and layer 3 device bandwidths using B-node theory
Modern computer networks contain an amalgamation of devices and technologies, with the performance exhibited by each central to digital communications. Varieties of methods exist ...
S. Cikara, Stanislaw P. Maj, David T. Shaw
ACSC
2006
IEEE
13 years 10 months ago
Human visual perception of region warping distortions
Interactive virtual reality requires at least 60 frames per second in order to ensure smooth motion. For a good immersive experience, it is also necessary to have low end-to-end l...
Yang-Wai Chow, Ronald Pose, Matthew Regan, James P...
ACSC
2006
IEEE
13 years 10 months ago
On pedagogically sound examples in public-key cryptography
Pencil-and-paper exercises in public-key cryptography are important in learning the subject. It is desirable that a student doing such an exercise does not get the right answer by...
Suan Khai Chong, Graham Farr, Laura Frost, Simon H...
ACSC
2006
IEEE
13 years 10 months ago
On compensating the Mel-frequency cepstral coefficients for noisy speech recognition
This paper describes a novel noise-robust automatic speech recognition (ASR) front-end that employs a combination of Mel-filterbank output compensation and cumulative distribution...
Eric H. C. Choi
ACSC
2006
IEEE
13 years 10 months ago
Pruning subscriptions in distributed publish/subscribe systems
Publish/subscribe systems utilize filter algorithms to determine all subscriptions matching incoming event messages. To distribute such services, subscriptions are forwarded to s...
Sven Bittner, Annika Hinze
ACSC
2006
IEEE
13 years 10 months ago
Plagiarism detection across programming languages
Plagiarism is a widespread problem in assessment tasks; in computing courses, students often plagiarise source code. For all but the smallest classes, manual detection of such pla...
Christian Arwin, Seyed M. M. Tahaghoghi
ACSC
2006
IEEE
13 years 10 months ago
Rendering multi-perspective images with trilinear projection
Non-linear projections of 3D graphical scenes can be used to compute reflections and refractions in curved surfaces, draw artistic images in the style of Escher or Picasso, and p...
Scott Vallance, Paul R. Calder
ACSC
2006
IEEE
13 years 10 months ago
A semantic approach to boost passage retrieval effectiveness for question answering
In the current state of the rapid growth of information resources and the huge number of requests submitted by users to existing information retrieval systems; recently, Question ...
Bahadorreza Ofoghi, John Yearwood, Ranadhir Ghosh
ACSC
2006
IEEE
13 years 10 months ago
Segregated failures model for availability evaluation of fault-tolerant systems
This paper presents a method of estimating the availability of fault-tolerant computer systems with several recovery procedures. A segregated failures model has been proposed rece...
Sergiy A. Vilkomir, David Lorge Parnas, Veena B. M...