Sciweavers

757 search results - page 81 / 152
» Assessing tools for use with webcasts
Sort
View
ACSAC
2002
IEEE
15 years 2 months ago
Protecting Data from Malicious Software
Corruption or disclosure of sensitive user documents can be among the most lasting and costly effects of malicious software attacks. Many malicious programs specifically target fi...
Matthew Schmid, Frank Hill, Anup K. Ghosh
81
Voted
LREC
2008
97views Education» more  LREC 2008»
14 years 11 months ago
On Classifying Coherent/Incoherent Romanian Short Texts
In this paper we present and discuss the results of a text coherence experiment performed on a small corpus of Romanian text from a number of alternative high school manuals. Duri...
Anca Dinu
LISA
2001
14 years 11 months ago
Macroscopic Internet Topology and Performance Measurements from the DNS Root Name Servers
We describe active measurements of topology and end-to-end latency characteristics between several of the DNS root servers and a subset of their clients using the skitter tool dev...
Marina Fomenkov, Kimberly C. Claffy, Bradley Huffa...
CORR
2010
Springer
150views Education» more  CORR 2010»
14 years 9 months ago
Framework for Visualizing Model-Driven Software Evolution and its Application
Software Visualization encompasses the development and evaluation of methods for graphically representing different aspects of methods of software, including its structure, execut...
Akepogu Anand Rao, Karanam Madhavi
FTCGV
2006
118views more  FTCGV 2006»
14 years 9 months ago
Mesh Parameterization Methods and Their Applications
We present a survey of recent methods for creating piecewise linear mappings between triangulations in 3D and simpler domains such as planar regions, simplicial complexes, and sph...
Alla Sheffer, Emil Praun, Kenneth Rose