Sciweavers

179 search results - page 7 / 36
» On Perfect Codes and Related Concepts
Sort
View
ICSE
1998
IEEE-ACM
15 years 2 months ago
Extracting Concepts from File Names: A New File Clustering Criterion
Decomposing complex software systems into conceptually independent subsystems is a significant software engineering activity which received considerable research attention. Most o...
Nicolas Anquetil, Timothy Lethbridge
LREC
2008
121views Education» more  LREC 2008»
14 years 11 months ago
Prolexbase: a Multilingual Relational Lexical Database of Proper Names
This paper deals with a multilingual relational lexical database of proper name, Prolexbase, a free resource available on the CNRTL website. The Prolex model is based on two main ...
Denis Maurel
ICSE
2008
IEEE-ACM
15 years 10 months ago
Security metrics for source code structures
Software security metrics are measurements to assess security related imperfections (or perfections) introduced during software development. A number of security metrics have been...
Istehad Chowdhury, Brian Chan, Mohammad Zulkernine
AND
2009
14 years 7 months ago
Kernel-based relation extraction from investigative data
In a specific process of business intelligence, i.e. investigation on organized crime, empirical language processing technologies can play a crucial role. In the data used on inve...
Cristina Giannone, Roberto Basili, Chiara Del Vesc...
TIT
2008
87views more  TIT 2008»
14 years 9 months ago
Coding Theorems on the Threshold Scheme for a General Source
In this paper, coding theorems on the (t; m)-threshold scheme for a general source are discussed, where m means the number of the shares and t means a threshold. The (t; m)-thresho...
Hiroki Koga