Sciweavers

21319 search results - page 58 / 4264
» An Approach for Method Reengineering
Sort
View
ICIP
2004
IEEE
15 years 11 months ago
A fast and adaptive method for image contrast enhancement
In this paper we describe a fast approach for image contrast enhancement, based on localized contrast manipulation. Our approach is not only fast and easy to implement, but also h...
Zeyun Yu, Chandrajit L. Bajaj
GPC
2009
Springer
14 years 7 months ago
Integrity Assurance Technique Using Determinant Approach
Data integrity is an important aspect of storage security and reliability which are prerequisite for most computer systems and network applications. This paper proposes a new tech...
Jasim A. Ghaeb
ICSE
2008
IEEE-ACM
15 years 10 months ago
Scalable detection of semantic clones
Several techniques have been developed for identifying similar code fragments in programs. These similar fragments, referred to as code clones, can be used to identify redundant c...
Mark Gabel, Lingxiao Jiang, Zhendong Su
DBSEC
2000
138views Database» more  DBSEC 2000»
14 years 11 months ago
Discovery of Multi-Level Security Policies
With the increasing complexity and dynamics of database and information systems, it becomes more and more di cult for administrative personnel to identify, specify and enforce sec...
Christina Yip Chung, Michael Gertz, Karl N. Levitt
FLAIRS
2004
14 years 11 months ago
Combining Methods for Word Sense Disambiguation of WordNet Glosses
This paper presents a new approach for combining different semantic disambiguation methods that are part of a Word Sense Disambiguation(WSD) system. The way these methods are comb...
Adrian Novischi