Sciweavers

138 search results - page 16 / 28
» An empirical methodology for introducing software processes
Sort
View
COMPSAC
2005
IEEE
13 years 9 months ago
Efficiently Managing Security Concerns in Component Based System Design
Component-based software development (CBSD) offers many advantages like reduced product time to market, reduced complexity and cost etc. Despite these advantages its wide scale ut...
Ammar Masood, Sahra Sedigh-Ali, Arif Ghafoor
WWW
2005
ACM
14 years 8 months ago
WEESA: Web engineering for semantic Web applications
The success of the Semantic Web crucially depends on the existence of Web pages that provide machine-understandable meta-data. This meta-data is typically added in the semantic an...
Gerald Reif, Harald Gall, Mehdi Jazayeri
ICASSP
2011
IEEE
12 years 11 months ago
BEMD for expression transformation in face recognition
This work presents a novel methodology for the transformation of facial expressions, to assist face biometrics. It is known that identification using only one image per subject p...
Hoda Mohammadzade, Foteini Agrafioti, Jiexin Gao, ...
PVLDB
2008
138views more  PVLDB 2008»
13 years 7 months ago
Authenticating the query results of text search engines
The number of successful attacks on the Internet shows that it is very difficult to guarantee the security of online search engines. A breached server that is not detected in time...
HweeHwa Pang, Kyriakos Mouratidis
ATAL
2009
Springer
14 years 2 months ago
Decommitting in multi-agent execution in non-deterministic environment: experimental approach
The process of planning in complex, multi-actor environment depends strongly on the ability of the individual actors to perform intelligent decommitment upon specific changes in ...
Jirí Vokrínek, Antonín Komend...