Sciweavers

829 search results - page 139 / 166
» A new watermarking approach for relational data
Sort
View
HICSS
2003
IEEE
142views Biometrics» more  HICSS 2003»
15 years 3 months ago
Blackout Mitigation Assessment in Power Transmission Systems
Electric power transmission systems are a key infrastructure and blackouts of these systems have major direct and indirect consequences on the economy and national security. Analy...
Benjamin A. Carreras, Vickie E. Lynch, David E. Ne...
CAEPIA
2003
Springer
15 years 3 months ago
Clustering Main Concepts from e-Mails
E–mail is one of the most common ways to communicate, assuming, in some cases, up to 75% of a company’s communication, in which every employee spends about 90 minutes a day in ...
Jesús S. Aguilar-Ruiz, Domingo S. Rodr&iacu...
ISSRE
2002
IEEE
15 years 2 months ago
Mutation of Java Objects
Fault insertion based techniqueshave been used for measuring test adequacy and testability of programs. Mutation analysis inserts faults into a program with the goal of creating m...
Roger T. Alexander, James M. Bieman, Sudipto Ghosh...
IFL
1998
Springer
139views Formal Methods» more  IFL 1998»
15 years 2 months ago
Higher Order Demand Propagation
Abstract. In this report a new backward strictness analysis for functional languages is presented. It is called higher order demand propagation and is applicable to a realistic non...
Dirk Pape
WDAG
1998
Springer
110views Algorithms» more  WDAG 1998»
15 years 2 months ago
Seamlessly Selecting the Best Copy from Internet-Wide Replicated Web Servers
The explosion of the web has led to a situation where a majority of the traffic on the Internet is web related. Today, practically all of the popular web sites are served from sing...
Yair Amir, Alec Peterson, David Shaw