Sciweavers

1489 search results - page 95 / 298
» The First Bug Report
Sort
View
DAC
2005
ACM
16 years 5 months ago
Towards scalable flow and context sensitive pointer analysis
Pointer analysis, a classic problem in software program analysis, has emerged as an important problem to solve in design automation, at a time when complex designs, specified in t...
Jianwen Zhu
CHI
2002
ACM
16 years 4 months ago
Usability inspections by groups of specialists: perceived agreement in spite of disparate observations
Evaluators who examine the same system using the same usability evaluation method tend to report substantially different sets of problems. This so-called evaluator effect means th...
Morten Hertzum, Niels Ebbe Jacobsen, Rolf Molich
ACSAC
2007
IEEE
15 years 10 months ago
The Design and Development of an Undercover Multipurpose Anti-spoofing Kit (UnMask)
This paper describes the design and development of a software system to support law enforcement in investigating and prosecuting email based crimes. It focuses on phishing scams w...
Sudhir Aggarwal, Jasbinder Bali, Zhenhai Duan, Leo...
ICMCS
2007
IEEE
155views Multimedia» more  ICMCS 2007»
15 years 10 months ago
Hidden Maximum Entropy Approach for Visual Concept Modeling
Recently, the bag-of-words approach has been successfully applied to automatic image annotation, object recognition, etc. The method needs to first quantize an image using the vis...
Sheng Gao, Joo-Hwee Lim, Qibin Sun
CBMS
2005
IEEE
15 years 9 months ago
Grid Computing in 3D-EM Image Processing Using Xmipp
Image processing in three-dimensional electron microscopy (3D-EM) is characterized by large amounts of data, and voluminous computing requirements. Here, we report our first exper...
Sjors H. W. Scheres, A. J. Merino, Carlos Oscar S&...