Sciweavers

13383 search results - page 2338 / 2677
» Abstractions from proofs
Sort
View
ICCS
2007
Springer
15 years 10 months ago
Enhanced Situational Awareness: Application of DDDAS Concepts to Emergency and Disaster Management
Abstract. We describe a prototype emergency and disaster information system designed and implemented using DDDAS concepts. The system is designed to use real-time cell phone callin...
Gregory R. Madey, Albert-László Bara...
IMA
2007
Springer
132views Cryptology» more  IMA 2007»
15 years 10 months ago
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Onur Aciiçmez, Shay Gueron, Jean-Pierre Sei...
OOPSLA
2007
Springer
15 years 10 months ago
IAnticorruption: a domain-driven design approach to more robust integration
Custom House's new currency exchange system is integrated with a legacy system. After a few years of growth, the two systems were so intricately tangled that even small chang...
Sam Peng, Ying Hu
SCIA
2007
Springer
182views Image Analysis» more  SCIA 2007»
15 years 10 months ago
The Statistical Properties of Local Log-Contrast in Natural Images
Abstract. The study of natural image statistics considers the statistical properties of large collections of images from natural scenes, and has applications in image processing, c...
Jussi T. Lindgren, Jarmo Hurri, Aapo Hyvärine...
AGILEDC
2006
IEEE
15 years 10 months ago
Using an Agile Approach in a Large, Traditional Organization
Can Agile approaches be used successfully in large organizations, where traditional methods and high levels of governance are the norm? Although the iterative, agile approaches ha...
Dot Tudor, George A. Walter
« Prev « First page 2338 / 2677 Last » Next »