Sciweavers

313 search results - page 58 / 63
» Error Correction Based on Verification Techniques
Sort
View
SP
2008
IEEE
133views Security Privacy» more  SP 2008»
15 years 4 months ago
ClearShot: Eavesdropping on Keyboard Input from Video
Eavesdropping on electronic communication is usually prevented by using cryptography-based mechanisms. However, these mechanisms do not prevent one from obtaining private informat...
Davide Balzarotti, Marco Cova, Giovanni Vigna
AOSE
2007
Springer
15 years 3 months ago
A Goal-Oriented Software Testing Methodology
Abstract. Agent-Oriented Software Engineering (AOSE) methodologies are proposed to develop complex distributed systems based upon the agent paradigm. The natural implementation for...
Duy Cu Nguyen, Anna Perini, Paolo Tonella
ISQED
2005
IEEE
84views Hardware» more  ISQED 2005»
15 years 3 months ago
Performance Driven OPC for Mask Cost Reduction
With continued aggressive process scaling in the subwavelength lithographic regime, resolution enhancement techniques (RETs) such as optical proximity correction (OPC) are an inte...
Puneet Gupta, Andrew B. Kahng, Dennis Sylvester, J...
MCS
2004
Springer
15 years 3 months ago
An Empirical Comparison of Hierarchical vs. Two-Level Approaches to Multiclass Problems
The ECOC framework provides a powerful and popular method for solving multiclass problems using a multitude of binary classifiers. We had recently introduced the Binary Hierarchica...
Suju Rajan, Joydeep Ghosh
ICDAR
2003
IEEE
15 years 2 months ago
On Machine Understanding of Online Handwritten Mathematical Expressions
This paper aims at automatic recognition of online handwritten mathematical expressions written on an electronic tablet. The proposed technique involves two major stages: symbol r...
Utpal Garain, B. B. Chaudhuri