Sciweavers

1566 search results - page 65 / 314
» Contification Using Dominators
Sort
View
FC
2009
Springer
142views Cryptology» more  FC 2009»
15 years 4 months ago
Passwords: If We're So Smart, Why Are We Still Using Them?
While a lot has changed in Internet security in the last 10 years, a lot has stayed the same – such as the use of alphanumeric passwords. Passwords remain the dominant means of a...
Cormac Herley, Paul C. van Oorschot, Andrew S. Pat...
ICIAR
2010
Springer
15 years 2 months ago
Structural Similarity-Based Approximation of Signals and Images Using Orthogonal Bases
The structural similarity (SSIM) index has been shown to be an useful tool in a wide variety of applications that involve the assessment of image quality and similarity. However, i...
Dominique Brunet, Edward R. Vrscay, Zhou Wang
CC
2000
Springer
100views System Software» more  CC 2000»
15 years 2 months ago
A Static Study of Java Exceptions Using JESP
JESP is a tool for statically examining the usage of user thrown exceptions in Java source code. Reported here are the first findings over a dataset of 31 publicly available Java...
Barbara G. Ryder, Donald Smith, Ulrich Kremer, Mic...
HICSS
1998
IEEE
112views Biometrics» more  HICSS 1998»
15 years 2 months ago
The Dynamics of Market Power with Deregulated Electricity Generation Supplies
Deregulated wholesale markets for bulk electricity supplies are likely to deviate from the perfectly competitive ideal in many areas where transmission losses, costs and capacity ...
Richard E. Schuler
RTSS
1996
IEEE
15 years 1 months ago
Visual assessment of a real-time system design: a case study on a CNC controller
In this paper we describe our experiments on a realtime system design, focusing on design alternatives such as scheduling jitter, sensor-to-output latency, intertask communication...
Namyun Kim, Minsoo Ryu, Seongsoo Hong, Manas Sakse...