Sciweavers

851 search results - page 157 / 171
» A Governance Model for SOA
Sort
View
ICCV
1999
IEEE
14 years 27 days ago
3D Pose Tracking with Linear Depth and Brightness Constraints
This paper explores the direct motion estimation problem assuming that video-rate depth information is available, from either stereo cameras or other sensors. We use these depth m...
Michael Harville, Ali Rahimi, Trevor Darrell, Gail...
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
14 years 25 days ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
CEC
2007
IEEE
14 years 18 days ago
A multi-layered solution for supporting isp traffic demand using genetic algorithm
This paper proposes a unique feedback governed multi layered architectural model to support ISP's traffic demands with multiple Quality of Service(QoS) constraints. The propos...
Gajaruban Kandavanam, Dmitri Botvich, Sasitharan B...
ER
2007
Springer
109views Database» more  ER 2007»
14 years 16 days ago
Selfish-brain Theory: Challenges in the Top-down Analysis of Metabolic Supply Chains
The Selfish-brain theory has created the theoretical basis for the systemic analysis of the energy metabolism in terms of a supply chain. The energy in form of glucose equivalents...
Dirk Langemann
DGO
2007
124views Education» more  DGO 2007»
13 years 10 months ago
Assessing capability for justice information sharing
Enhanced information sharing among criminal justice agencies is a critical concern and a goal of much IT investment. Understanding agencies’ capabilities to achieve this goal is...
Anthony M. Cresswell, Theresa A. Pardo, Shahidul H...