Sciweavers

334 search results - page 43 / 67
» A first step towards algorithm plagiarism detection
Sort
View
MOBIHOC
2005
ACM
15 years 9 months ago
Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks
Mobile sinks are needed in many sensor network applications for efficient data collection, data querying, localized sensor reprogramming, identifying and revoking compromised sens...
Wensheng Zhang, Hui Song, Sencun Zhu, Guohong Cao
IPPS
1999
IEEE
15 years 2 months ago
A Transformational Framework for Skeletal Programs: Overview and Case Study
A structured approach to parallel programming allows to construct applications by composing skeletons, i.e., recurring patterns of task- and data-parallelism. First academic and co...
Sergei Gorlatch, Susanna Pelagatti
IPMI
2001
Springer
15 years 10 months ago
Feature Enhancement in Low Quality Images with Application to Echocardiography
In this paper we propose a novel approach to feature enhancement to enhance the quality of noisy images. Our approach is based on a phase-based feature detection algorithm, followe...
Djamal Boukerroui, J. Alison Noble, Michael Brady
CLEF
2009
Springer
14 years 10 months ago
MorphoNet: Exploring the Use of Community Structure for Unsupervised Morpheme Analysis
This paper investigates a novel approach to unsupervised morphology induction relying on community detection in networks. In a first step, morphological transformation rules are a...
Delphine Bernhard
WCRE
2000
IEEE
15 years 2 months ago
Revisiting the Delta IC Approach to Component Recovery
Component recovery supports program understanding, architecture recovery, and re-use. Among the best known techniques for detection of re-usable objects (related global variables ...
Gerardo Canfora, Jörg Czeranski, Rainer Kosch...