Sciweavers

668 search results - page 66 / 134
» Implementing and Evaluating Automatic Checkpointing
Sort
View
WACV
2007
IEEE
15 years 4 months ago
Threshold-based 3D Tumor Segmentation using Level Set (TSL)
Three-dimensional segmentation is reliable approach to achieve a proper estimation of tumor volume. Among all possible methods for this purpose, level set can be used as a powerfu...
Sima Taheri, Sim Heng Ong, Vincent Chong
COCOA
2007
Springer
15 years 4 months ago
A New Exact Algorithm for the Two-Sided Crossing Minimization Problem
The Two-Sided Crossing Minimization (TSCM) problem calls for minimizing the number of edge crossings of a bipartite graph where the two sets of vertices are drawn on two parallel l...
Lanbo Zheng, Christoph Buchheim
PADL
2007
Springer
15 years 3 months ago
Rewriting Haskell Strings
Abstract The Haskell String type is notoriously inefficient. We introduce a new data type, ByteString, based on lazy lists of byte arrays, combining the speed benefits of strict a...
Duncan Coutts, Don Stewart, Roman Leshchinskiy
ACSAC
2006
IEEE
15 years 3 months ago
Static Detection of Vulnerabilities in x86 Executables
In the last few years, several approaches have been proposed to perform vulnerability analysis of applications written in high-level languages. However, little has been done to au...
Marco Cova, Viktoria Felmetsger, Greg Banks, Giova...
HICSS
2006
IEEE
176views Biometrics» more  HICSS 2006»
15 years 3 months ago
Learning by Browsing: A Web-Based Multimedia Browsing System for Learning
Multimedia, especially video, is widely used in educational applications. More and more universities and corporations now provide videotaped lectures online for knowledge sharing ...
Ming Lin, Jinwei Cao, Christopher B. R. Diller, Ja...