Sciweavers

151 search results - page 20 / 31
» From Monads to Effects and Back
Sort
View
ACL
2006
14 years 11 months ago
Obfuscating Document Stylometry to Preserve Author Anonymity
This paper explores techniques for reducing the effectiveness of standard authorship attribution techniques so that an author A can preserve anonymity for a particular document D....
Gary Kacmarcik, Michael Gamon
DC
2001
14 years 11 months ago
The Meaning of LOM and LOM Authoring Tool on HRD
Activity for standardization about educational information is prosperous internationally. The LOM standard is meta-data about learning objects. Learning objects are every types of...
Kenji Hirata, Yoshiyuki Takaoka, Mamoru Ohta, Mits...
84
Voted
TAP
2008
Springer
94views Hardware» more  TAP 2008»
14 years 10 months ago
Vacuity in Testing
Abstract. In recent years, we see a growing awareness to the importance of assessing the quality of specifications. In the context of model checking, this can be done by analyzing ...
Thomas Ball, Orna Kupferman
INFOCOM
2010
IEEE
14 years 8 months ago
Layered Internet Video Engineering (LIVE): Network-Assisted Bandwidth Sharing and Transient Loss Protection for Scalable Video S
—This paper presents a novel scheme, Layered Internet Video Engineering (LIVE), in which network nodes feed back virtual congestion levels to video senders to assist both media-a...
Xiaoqing Zhu, Rong Pan, Nandita Dukkipati, Vijay S...
TIP
2010
129views more  TIP 2010»
14 years 8 months ago
Selective Data Pruning-Based Compression Using High-Order Edge-Directed Interpolation
—This paper proposes a selective data pruning-based compression scheme to improve the rate-distortion relation of compressed images and video sequences. The original frames are p...
Dung Trung Vo, Joel Solé, Peng Yin, Cristin...