Sciweavers

2421 search results - page 101 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
FASE
2009
Springer
15 years 7 months ago
HAVE: Detecting Atomicity Violations via Integrated Dynamic and Static Analysis
Abstract. The reality of multi-core hardware has made concurrent programs pervasive. Unfortunately, writing correct concurrent programs is difficult. Atomicity violation, which is ...
Qichang Chen, Liqiang Wang, Zijiang Yang, Scott D....
VLDB
2007
ACM
93views Database» more  VLDB 2007»
16 years 28 days ago
Measuring the Structural Similarity of Semistructured Documents Using Entropy
We propose a technique for measuring the structural similarity of semistructured documents based on entropy. After extracting the structural information from two documents we use ...
Sven Helmer
ICDE
2006
IEEE
275views Database» more  ICDE 2006»
16 years 2 months ago
Privacy Preserving Query Processing Using Third Parties
Data integration from multiple autonomous data sources has emerged as an important practical problem. The key requirement for such data integration is that owners of such data nee...
Amr El Abbadi, Aziz Gulbeden, Divyakant Agrawal, F...
123
Voted
ICIP
2003
IEEE
16 years 2 months ago
Scene cut detection using the colored pattern appearance model
In this paper, we propose to use the Colored Pattern Appearance Model (CPAM) as a content representation for video scene break detection. This model represents a scene by means of...
Kin-Wai Sze, Kin-Man Lam, Guoping Qiu
118
Voted
GLOBECOM
2009
IEEE
15 years 4 months ago
Localization Using Radial Basis Function Networks and Signal Strength Fingerprints in WLAN
Abstract—Fingerprinting localization techniques provide reliable location estimates and enable the development of location aware applications especially for indoor environments, ...
Christos Laoudias, Paul Kemppi, Christos G. Panayi...