Sciweavers

407 search results - page 27 / 82
» An Automated Verification Method for Distributed Systems Sof...
Sort
View
INFSOF
2006
97views more  INFSOF 2006»
13 years 8 months ago
Applying Model-Driven Architecture to achieve distribution transparencies
This paper proposes a principled methodology for the realization of distribution transparencies. The proposed methodology is placed within the general context of Model-Driven Arch...
Apostolos Zarras
ICIP
2007
IEEE
14 years 3 months ago
Motion Detection using a Model of Visual Attention
Motion detection and estimation are known to be important in many automated surveillance systems. It has drawn significant research interest in the field of computer vision. This ...
Shijie Zhang, Fred Stentiford
ICB
2009
Springer
122views Biometrics» more  ICB 2009»
14 years 3 months ago
A New Fake Iris Detection Method
Recent research works have revealed that it is not difficult to spoof an automated iris recognition system using fake iris such as contact lens and paper print etc. Therefore, it i...
XiaoFu He, Yue Lu, Pengfei Shi
ICSM
2002
IEEE
14 years 1 months ago
Maintaining Software with a Security Perspective
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels....
Kanta Jiwnani, Marvin V. Zelkowitz
IADIS
2008
13 years 10 months ago
Design of an Automated System for Clustering Heterogeneous Data
The goal of this work is to study the feasibility of a Heterogeneous Data Classification and Search (HDCS) system and to provide a possible design for its implementing. In order t...
Dorin Carstoiu, Alexandra Cernian, Adriana Olteanu...