Sciweavers

2156 search results - page 258 / 432
» Effective performance measurement and analysis of multithrea...
Sort
View
HICSS
2006
IEEE
145views Biometrics» more  HICSS 2006»
15 years 4 months ago
Resource Decisions in Software Development Using Risk Assessment Model
The resource decisions in software project using cost models do not satisfy managerial decision, as it does not support trade-off analysis among resources. A Bayesian net approach...
Wiboon Jiamthubthugsin, Daricha Sutivong
67
Voted
ICDAR
2009
IEEE
15 years 4 months ago
Detecting Printed and Handwritten Partial Copies of Line Drawings Embedded in Complex Backgrounds
The partial copy is a kind of copy produced by cropping parts of original materials. Illegal users often use this technique for plagiarizing copyrighted materials. In addition, or...
Weihan Sun, Koichi Kise
ICDM
2008
IEEE
118views Data Mining» more  ICDM 2008»
15 years 4 months ago
Dirichlet Process Based Evolutionary Clustering
Evolutionary Clustering has emerged as an important research topic in recent literature of data mining, and solutions to this problem have found a wide spectrum of applications, p...
Tianbing Xu, Zhongfei (Mark) Zhang, Philip S. Yu, ...
ACSAC
2006
IEEE
15 years 4 months ago
Static Detection of Vulnerabilities in x86 Executables
In the last few years, several approaches have been proposed to perform vulnerability analysis of applications written in high-level languages. However, little has been done to au...
Marco Cova, Viktoria Felmetsger, Greg Banks, Giova...
RT
2004
Springer
15 years 3 months ago
Hardware Accelerated Visibility Preprocessing using Adaptive Sampling
We present a novel aggressive visibility preprocessing technique for general 3D scenes. Our technique exploits commodity graphics hardware and is faster than most conservative sol...
Shaun Nirenstein, Edwin H. Blake