Sciweavers

7262 search results - page 356 / 1453
» Reversible Computer Hardware
Sort
View
ICPR
2008
IEEE
15 years 10 months ago
Approximation of salient contours in cluttered scenes
This paper proposes a new approach to describe the salient contours in cluttered scenes. No need to do the preprocessing, such as edge detection, we directly use a set of random s...
Rui Huang, Nong Sang, Qiling Tang
115
Voted
HICSS
2006
IEEE
90views Biometrics» more  HICSS 2006»
15 years 10 months ago
Text Understanding Agents and the Semantic Web
— We discuss the challenges involved in adapting the OntoSem natural language processing system to the Web. One set of tasks involves processing Web documents, translating their ...
Akshay Java, Tim Finin, Sergei Nirenburg
ICDCS
2006
IEEE
15 years 10 months ago
A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks
Global-scale attacks like viruses and worms are increasing in frequency, severity and sophistication, making it critical to detect outbursts at routers/gateways instead of end hos...
Yan Gao, Zhichun Li, Yan Chen
MSR
2006
ACM
15 years 9 months ago
How long did it take to fix bugs?
The number of bugs (or fixes) is a common factor used to measure the quality of software and assist bug related analysis. For example, if software files have many bugs, they may b...
Sunghun Kim, E. James Whitehead Jr.
SAC
2006
ACM
15 years 9 months ago
Adapting software components by structure fragmentation
We present in this paper an approach aiming at adapting software components. It focuses on adapting component structures instead of adapting component services. Among the motivati...
Gautier Bastide, Abdelhak Seriai, Mourad Oussalah