Sciweavers

19798 search results - page 3713 / 3960
» Is Structural Subtyping Useful
Sort
View
IM
2003
15 years 5 months ago
Facilitating Efficient and Reliable Monitoring through HAMSA
: Monitoring is a fundamental building block of any network management system. It is needed to ensure that the network operates within the required parameters, and to account for u...
David Breitgand, Danny Dolev, Danny Raz, Gleb Shav...
USS
2004
15 years 5 months ago
TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection
Buffer overflow exploits make use of the treatment of strings in C as character arrays rather than as first-class objects. Manipulation of arrays as pointers and primitive pointer...
Kumar Avijit, Prateek Gupta, Deepak Gupta
ANLP
2000
141views more  ANLP 2000»
15 years 5 months ago
Aggressive Morphology for Robust Lexical Coverage
This paper describes an approach to providing lexical information for natural language processing in unrestricted domains. A system of approximately 1200 morphological rules is us...
William A. Woods
WSCG
2003
327views more  WSCG 2003»
15 years 5 months ago
Image Recoloring Induced by Palette Color Associations
In this paper we present a non-interactive method for recoloring a destination image according to the color scheme found in a source image. The approach is motivated by trying to ...
G. R. Greenfield, D. H. House
WSCG
2003
166views more  WSCG 2003»
15 years 5 months ago
View-Dependent Multiresolution Model For Foliage
Real-time rendering of vegetation is one of the most important challenges in outdoor scenes. This is due to the vast amount of polygons that are used to model vegetable species. M...
Inmaculada Remolar, Miguel Chover, José Rib...
« Prev « First page 3713 / 3960 Last » Next »