In this paper we describe a fast approach for image contrast enhancement, based on localized contrast manipulation. Our approach is not only fast and easy to implement, but also h...
Data integrity is an important aspect of storage security and reliability which are prerequisite for most computer systems and network applications. This paper proposes a new tech...
Several techniques have been developed for identifying similar code fragments in programs. These similar fragments, referred to as code clones, can be used to identify redundant c...
With the increasing complexity and dynamics of database and information systems, it becomes more and more di cult for administrative personnel to identify, specify and enforce sec...
Christina Yip Chung, Michael Gertz, Karl N. Levitt
This paper presents a new approach for combining different semantic disambiguation methods that are part of a Word Sense Disambiguation(WSD) system. The way these methods are comb...