Sciweavers

2539 search results - page 353 / 508
» Debugging Method Names
Sort
View
CSE
2009
IEEE
15 years 9 months ago
Bio-chaotic Stream Cipher-Based Iris Image Encryption
Conventional cryptography uses encryption key, which are long bit strings and are very hard to memorize such a long random numbers. Also it can be easily attacked by using the brut...
Abdullah Sharaf Alghamdi, Hanif Ullah, Maqsood Mah...
DEXAW
2009
IEEE
92views Database» more  DEXAW 2009»
15 years 9 months ago
Enhancing Person Annotation for Personal Photo Management Applications
—This paper addresses a sub-problem of the broad annotation problem, namely “person annotation”, associated with personal digital photo management and investigates approaches...
Saman Hemantha Cooray, Noel E. O'Connor
ICASSP
2009
IEEE
15 years 9 months ago
Space Kernel Analysis
In this paper, we propose a novel nonparametric modeling technique, namely Space Kernel Analysis (SKA), as a result of the definition of the space kernel. We analyze the uncertai...
Liuling Gong, Dan Schonfeld
WCRE
2009
IEEE
15 years 9 months ago
Who are Source Code Contributors and How do they Change?
—Determining who are the copyright owners of a software system is important as they are the individuals and organizations that license the software to its users, and ultimately t...
Massimiliano Di Penta, Daniel M. Germán
ICDM
2009
IEEE
112views Data Mining» more  ICDM 2009»
15 years 9 months ago
Resolving Identity Uncertainty with Learned Random Walks
A pervasive problem in large relational databases is identity uncertainty which occurs when multiple entries in a database refer to the same underlying entity in the world. Relati...
Ted Sandler, Lyle H. Ungar, Koby Crammer