Sciweavers

82 search results - page 15 / 17
» An approach for integrating basic retiming and software pipe...
Sort
View
81
Voted
IH
2001
Springer
15 years 2 months ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu
JUCS
2010
116views more  JUCS 2010»
14 years 8 months ago
Content Recommendation in APOSDLE using the Associative Network
: One of the success factors of Work Integrated Learning (WIL) is to provide the appropriate content to the users, both suitable for the topics they are currently working on, and t...
Hermann Stern, Rene Kaiser, Philip Hofmair, Peter ...
BMCBI
2004
87views more  BMCBI 2004»
14 years 9 months ago
prot4EST: Translating Expressed Sequence Tags from neglected genomes
Background: The genomes of an increasing number of species are being investigated through generation of expressed sequence tags (ESTs). However, ESTs are prone to sequencing error...
James Wasmuth, Mark L. Blaxter
EUROSYS
2010
ACM
15 years 2 months ago
Residue objects: a challenge to web browser security
A complex software system typically has a large number of objects in the memory, holding references to each other to implement an object model. Deciding when the objects should be...
Shuo Chen, Hong Chen, Manuel Caballero
AWIC
2003
Springer
15 years 2 months ago
Using Case-Based Reasoning to Improve Information Retrieval in Knowledge Management Systems
Abstract. Complementary to hypertext navigation, classic information retrieval is broadly used to find information on the World Wide Web and on Web-based systems. Among these there...
Norbert Gronau, Frank Laskowski