Sciweavers

268 search results - page 44 / 54
» A Framework for High Assurance Security of Distributed Objec...
Sort
View
OOPSLA
2010
Springer
13 years 7 months ago
Scalable and systematic detection of buggy inconsistencies in source code
Software developers often duplicate source code to replicate functionality. This practice can hinder the maintenance of a software project: bugs may arise when two identical code ...
Mark Gabel, Junfeng Yang, Yuan Yu, Moisés G...
IPPS
2005
IEEE
14 years 2 months ago
Fault-Tolerant Parallel Applications with Dynamic Parallel Schedules
Commodity computer clusters are often composed of hundreds of computing nodes. These generally off-the-shelf systems are not designed for high reliability. Node failures therefore...
Sebastian Gerlach, Roger D. Hersch
CVPR
2008
IEEE
14 years 11 months ago
Kernel-based learning of cast shadows from a physical model of light sources and surfaces for low-level segmentation
In background subtraction, cast shadows induce silhouette distortions and object fusions hindering performance of high level algorithms in scene monitoring. We introduce a nonpara...
André Zaccarin, Nicolas Martel-Brisson
SECURWARE
2008
IEEE
14 years 3 months ago
Rating Agencies Interoperation for Peer-to-Peer Online Transactions
— In current peer-to-peer systems users interact with unknown services and users for the purpose of online transactions such as file sharing and trading of commodities. Peer-to-...
Mihaela Ion, Hristo Koshutanski, Volker Hoyer, Lui...
DSOM
2006
Springer
14 years 23 days ago
Efficient Information Retrieval in Network Management Using Web Services
Abstract. Web Services is an XML-based technology that has attracted significant attention for building distributed Internet services. There have also been significant efforts tryi...
Aimilios Chourmouziadis, George Pavlou