Sciweavers

1976 search results - page 318 / 396
» Application Semiotics Engineering Process
Sort
View
EUROSYS
2008
ACM
14 years 5 months ago
Application-level isolation and recovery with solitude
When computer systems are compromised by an attack, it is difficult to determine the precise extent of the damage caused by the attack because the state changes made by an attack...
Shvetank Jain, Fareha Shafique, Vladan Djeric, Ash...
MM
2009
ACM
260views Multimedia» more  MM 2009»
14 years 3 months ago
Web image mining towards universal age estimator
In this paper, we present an automatic web image mining system towards building a universal human age estimator based on facial information, which is applicable to all ethnic grou...
Bingbing Ni, Zheng Song, Shuicheng Yan
PPOPP
2003
ACM
14 years 2 months ago
Optimizing data aggregation for cluster-based internet services
Large-scale cluster-based Internet services often host partitioned datasets to provide incremental scalability. The aggregation of results produced from multiple partitions is a f...
Lingkun Chu, Hong Tang, Tao Yang, Kai Shen
AI50
2006
14 years 17 days ago
Fifty Years of AI: From Symbols to Embodiment - and Back
There are many stories to tell about the first fifty years of AI. One story is about AI as one of the big forces of innovation in information technology. It is now forgotten that i...
Luc Steels
ASE
2006
78views more  ASE 2006»
13 years 8 months ago
Using software evolution to focus architectural recovery
Ideally, a software project commences with requirements gathering and specification, reaches its major milestone with system implementation and delivery, and then continues, possi...
Nenad Medvidovic, Vladimir Jakobac