Sciweavers

551 search results - page 28 / 111
» Preventing existence
Sort
View
ICDAR
2003
IEEE
15 years 2 months ago
New Approach for the Skeletonization of Handwritten Characters in Gray-Level Images
Existing skeletonization methods operate directly on the binary image ignoring the gray-level information. In this paper we propose a new method for the skeletonization of handwri...
Amer Dawoud, Mohamed Kamel
VL
2003
IEEE
128views Visual Languages» more  VL 2003»
15 years 2 months ago
Development and evaluation of a model of programming errors
Models of programming and debugging suggest many causes of errors, and many classifications of error types exist. Yet, there has been no attempt to link causes of errors to these ...
Andrew Jensen Ko, Brad A. Myers
81
Voted
IWMM
2010
Springer
157views Hardware» more  IWMM 2010»
15 years 2 months ago
Tracing garbage collection on highly parallel platforms
The pervasiveness of multiprocessor and multicore hardware and the rising level of available parallelism are radically changing the computing landscape. Can software deal with tom...
Katherine Barabash, Erez Petrank
ESSOS
2009
Springer
15 years 2 months ago
Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations
Injection attacks and their defense require a lot of creativity from attackers and secure system developers. Unfortunately, as attackers rely increasingly on systematic approaches ...
Munawar Hafiz, Paul Adamczyk, Ralph E. Johnson
RTCSA
1999
IEEE
15 years 1 months ago
Hard Real-Time Garbage-Collection in the Jamaica Virtual Machine
Java's automatic memory management is the main reason that prevents Java from being used in hard realtime environments. We present the garbage collection mechanism that is us...
Fridtjof Siebert