Sciweavers

4166 search results - page 692 / 834
» Automating the constraining process
Sort
View
104
Voted
CASES
2006
ACM
15 years 9 months ago
A network agent for diagnosis and analysis of real-time Ethernet networks
Within the field of automation technology the use of Industrial Ethernet is rising. This in turn demands devices capable of precisely recording, analyzing, and manipulating commu...
Hans-Peter Löb, Rainer Buchty, Wolfgang Karl
132
Voted
JCDL
2006
ACM
140views Education» more  JCDL 2006»
15 years 9 months ago
Exploring erotics in Emily Dickinson's correspondence with text mining and visual interfaces
This paper describes a system to support humanities scholars in their interpretation of literary work. It presents a user interface and web architecture that integrates text minin...
Catherine Plaisant, James Rose, Bei Yu, Loretta Au...
118
Voted
JCDL
2006
ACM
167views Education» more  JCDL 2006»
15 years 9 months ago
Combining DOM tree and geometric layout analysis for online medical journal article segmentation
We describe an HTML web page segmentation algorithm, which is applied to segment online medical journal articles (regular HTML and PDF-Converted-HTML files). The web page content ...
Jie Zou, Daniel X. Le, George R. Thoma
123
Voted
NSPW
2006
ACM
15 years 9 months ago
Dark application communities
In considering new security paradigms, it is often worthwhile to anticipate the direction and nature of future attack paradigms. We identify a class of attacks based on the idea o...
Michael E. Locasto, Angelos Stavrou, Angelos D. Ke...
SIGSOFT
2006
ACM
15 years 9 months ago
Detecting increases in feature coupling using regression tests
Repeated changes to a software system can introduce small weaknesses such as unplanned dependencies between different parts of the system. While such problems usually go undetecte...
Olivier Giroux, Martin P. Robillard