Sciweavers

1045 search results - page 38 / 209
» The Use of Exceptions
Sort
View
MUC
1992
15 years 4 months ago
GE-CMU: description of the TIPSTER/SHOGUN system as used for MUC-4
The GE-CMU team is developing the TIPSTER/SHOGUN system under the governmentsponsored TIPSTER program, which aims to advance coverage, accuracy, and portability in tex t interpret...
Paul S. Jacobs, George B. Krupka, Lisa F. Rau, Tod...
79
Voted
ICIP
1998
IEEE
16 years 2 months ago
Multiple Description Transform Coding of Images
Generalized multiple description coding (GMDC) is source coding for multiple channels such that a decoder which receives an arbitrary subset of the channels may produce a useful r...
Vivek K. Goyal, Jelena Kovacevic, Ramon Arean, Mar...
CBSQ
2003
Springer
15 years 5 months ago
Assessment of High Integrity Software Components for Completeness, Consistency, Fault-Tolerance, and Reliability
The use of formal model based (FMB) methods to evaluate the quality of the components is an important research area. Except for a growing number of exceptions, FMB methods are sti...
Hye Yeon Kim, Kshamta Jerath, Frederick T. Sheldon
FLAIRS
2008
15 years 2 months ago
An Intelligent Tutoring Architecture for Simulation-Based Training
Truly generic and reusable intelligent tutoring software architectures have remained elusive. As part of our effort to develop tutoring systems for simulations of ill-defined doma...
Dave Gomboc, Mark G. Core, H. Chad Lane, Ashish Ka...
107
Voted
CCS
2007
ACM
15 years 4 months ago
Offline untrusted storage with immediate detection of forking and replay attacks
We address the problem of using an untrusted server with only a trusted timestamping device (TTD) to provide trusted storage for a large number of clients, where each client may o...
Marten van Dijk, Jonathan Rhodes, Luis F. G. Sarme...