Sciweavers

641 search results - page 107 / 129
» A Framework for Analyzing Configurations of Deployable Softw...
Sort
View
149
Voted
ECCV
2004
Springer
16 years 5 months ago
Bayesian Correction of Image Intensity with Spatial Consideration
Abstract. Under dimly lit condition, it is difficult to take a satisfactory image in long exposure time with a hand-held camera. Despite the use of a tripod, moving objects in the ...
Jiaya Jia, Jian Sun, Chi-Keung Tang, Heung-Yeung S...
105
Voted
APSEC
2003
IEEE
15 years 9 months ago
JINI/J2EE Bridge for Large-scale IP Phone Services
Current IP phone architectures which bring phone services to a distributed open environment are eraltively static and do not scale well. An IP phone environment should be more dyn...
Jia Yu, Jan Newmarch, Michael Geisler
111
Voted
ICAIL
2007
ACM
15 years 7 months ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...
127
Voted
EUROSYS
2006
ACM
16 years 23 days ago
Using queries for distributed monitoring and forensics
Distributed systems are hard to build, profile, debug, and test. Monitoring a distributed system – to detect and analyze bugs, test for regressions, identify fault-tolerance pr...
Atul Singh, Petros Maniatis, Timothy Roscoe, Peter...
137
Voted
HICSS
2003
IEEE
160views Biometrics» more  HICSS 2003»
15 years 9 months ago
Context-Awareness on Mobile Devices - the Hydrogen Approach
Information about the user's environment offers new opportunities and exposes new challenges in terms of time-aware, location-aware, device-aware and personalized application...
Thomas Hofer, Wieland Schwinger, Mario Pichler, Ge...