Sciweavers

6750 search results - page 1266 / 1350
» Performance Analysis Framework for Layout Analysis Methods
Sort
View
PLDI
2006
ACM
15 years 8 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
130
Voted
SMI
2005
IEEE
111views Image Analysis» more  SMI 2005»
15 years 8 months ago
Rational Spherical Splines for Genus Zero Shape Modeling
Traditional approaches for modeling a closed manifold surface with either regular tensor-product or triangular splines (defined over an open planar domain) require decomposing th...
Ying He 0001, Xianfeng Gu, Hong Qin
SIGDOC
2005
ACM
15 years 8 months ago
User-centred design and evaluation of ubiquitous services
Theoretical and technological progress has revived the interest in the design of services for the support of co-located human-human communication and collaboration, witnessing the...
Rahat Iqbal, Janienke Sturm, Olga A. Kulyk, Jimmy ...
ICDM
2003
IEEE
92views Data Mining» more  ICDM 2003»
15 years 8 months ago
Validating and Refining Clusters via Visual Rendering
Clustering is an important technique for understanding and analysis of large multi-dimensional datasets in many scientific applications. Most of clustering research to date has be...
Keke Chen, Ling Liu
ECOOP
2003
Springer
15 years 8 months ago
LeakBot: An Automated and Lightweight Tool for Diagnosing Memory Leaks in Large Java Applications
Despite Java’s automatic reclamation of memory, memory leaks remain an important problem. For example, we frequently encounter memory leaks that cause production servers to crash...
Nick Mitchell, Gary Sevitsky
« Prev « First page 1266 / 1350 Last » Next »