Sciweavers

1147 search results - page 182 / 230
» An Object-Oriented Approach for High Availability of Applica...
Sort
View
FC
2005
Springer
157views Cryptology» more  FC 2005»
14 years 2 months ago
Securing Sensitive Data with the Ingrian DataSecure Platform
Recent high profile data thefts have shown that perimeter defenses are not sufficient to secure important customer data. The damage caused by these thefts can be disastrous, and to...
Andrew Koyfman
ECCV
2004
Springer
14 years 2 months ago
Computer-Aided Measurement of Solid Breast Tumor Features on Ultrasound Images
This paper presents a new approach in the application of computer vision techniques to the diagnosis of solid breast tumors on ultrasound images. Most works related to medical imag...
Miguel Alemán-Flores, Patricia Alemá...
SEM
2004
Springer
14 years 2 months ago
Experience with Lightweight Distributed Component Technologies in Business Intelligence Systems
Business Intelligence (BI) systems address the demands of large scale enterprises for operational analytics, management information and decision support tasks. Building such applic...
Leticia Duboc, Tony Wicks, Wolfgang Emmerich
EUROMICRO
2002
IEEE
14 years 1 months ago
Performance Tradeoffs for Static Allocation of Zero-Copy Buffers
Internet services like the world-wide web and multimedia applications like News- and Video-on-Demand have become very popular over the last years. Due to the large number of users ...
Pål Halvorsen, Espen Jorde, Karl-André...
ASPLOS
1998
ACM
14 years 1 months ago
Segregating Heap Objects by Reference Behavior and Lifetime
Dynamic storage allocation has become increasingly important in many applications, in part due to the use of the object-oriented paradigm. At the same time, processor speeds are i...
Matthew L. Seidl, Benjamin G. Zorn