Sciweavers

2539 search results - page 376 / 508
» Debugging Method Names
Sort
View
ISW
2004
Springer
15 years 10 months ago
A Distributed High Assurance Reference Monitor
Abstract Ajay Chander1 , Drew Dean2 , and John Mitchell3 1 DoCoMo Communications Laboratories USA, San Jose, CA 95110 2 Computer Science Laboratory, SRI International, Menlo Park, ...
Ajay Chander, Drew Dean, John C. Mitchell
CVPR
2010
IEEE
15 years 10 months ago
Minimum length in the tangent bundle as a model for curve completion
The phenomenon of visual curve completion, where the visual system completes the missing part (e.g., due to occlusion) between two contour fragments, is a major problem in percept...
Guy Ben-Yosef, Ohad Ben Shahar
ACSAC
2003
IEEE
15 years 10 months ago
An IP Traceback Technique against Denial-of-Service Attacks
Reflector attack [9] belongs to one of the most serious types of Denial-of-Service (DoS) attacks, which can hardly be traced by contemporary traceback techniques, since the marked...
Zhaole Chen, Moon-Chuen Lee
ICDAR
2003
IEEE
15 years 10 months ago
Recovery of Writing Sequence of Static Images of Handwriting using UWM
It is generally agreed that an on-line recognition system is always reliable than an off-line one. It is due to the availability of the dynamic information, especially the writing...
Kai Kwong Lau, Pong Chi Yuen, Yuan Yan Tang
ICDAR
2003
IEEE
15 years 10 months ago
Lexical Postcorrection of OCR-Results: The Web as a Dynamic Secondary Dictionary?
Postcorrection of OCR-results for text documents is usually based on electronic dictionaries. When scanning texts from a specific thematic area, conventional dictionaries often m...
Christian M. Strohmaier, Christoph Ringlstetter, K...