Sciweavers

2006 search results - page 182 / 402
» MUC-5 evaluation metrics
Sort
View
MSE
2002
IEEE
135views Hardware» more  MSE 2002»
15 years 6 months ago
The Impact of SMT/SMP Designs on Multimedia Software Engineering - A Workload Analysis Study
This paper presents the study of running several core multimedia applications on a simultaneous multithreading (SMT) architecture and derives design principles for multimedia soft...
Yen-Kuang Chen, Rainer Lienhart, Eric Debes, Matth...
ICIAR
2010
Springer
15 years 6 months ago
Entropy of Gabor Filtering for Image Quality Assessment
Abstract. A new algorithm for image quality assessment based on entropy of Gabor filtered images is proposed. A bank of Gabor filters is used to extract contours and directional ...
Esteban Vázquez-Fernández, Án...
CORR
2002
Springer
90views Education» more  CORR 2002»
15 years 1 months ago
Mostly-Unsupervised Statistical Segmentation of Japanese Kanji Sequences
Given the lack of word delimiters in written Japanese, word segmentation is generally considered a crucial first step in processing Japanese texts. Typical Japanese segmentation a...
Rie Kubota Ando, Lillian Lee
TSE
1998
112views more  TSE 1998»
15 years 1 months ago
Message Logging: Pessimistic, Optimistic, Causal, and Optimal
Message-logging protocols are an integral part of a popular technique for implementing processes that can recover from crash failures. All message-logging protocols require that, ...
Lorenzo Alvisi, Keith Marzullo
ICST
2010
IEEE
15 years 13 days ago
Searching for a Needle in a Haystack: Predicting Security Vulnerabilities for Windows Vista
—Many factors are believed to increase the vulnerability of software system; for example, the more widely deployed or popular is a software system the more likely it is to be att...
Thomas Zimmermann, Nachiappan Nagappan, Laurie A. ...