Sciweavers

973 search results - page 111 / 195
» Arguing Using Opponent Models
Sort
View
KBSE
2009
IEEE
15 years 11 months ago
Understanding the Value of Software Engineering Technologies
SEESAW combines AI search tools, a Monte Carlo simulator, and some software process models. We show here that, when selecting technologies for a software project, SEESAW out-perfo...
Phillip Green II, Tim Menzies, Steve Williams, Ous...
DATE
2007
IEEE
74views Hardware» more  DATE 2007»
15 years 10 months ago
Joint consideration of fault-tolerance, energy-efficiency and performance in on-chip networks
High reliability against noise, low energy consumption and high performance are key objectives in the design of on-chip networks. Recently some researchers have considered the var...
Alireza Ejlali, Bashir M. Al-Hashimi, Paul M. Rosi...
ICDAR
2007
IEEE
15 years 10 months ago
On Segmentation of Documents in Complex Scripts
Document image segmentation algorithms primarily aim at separating text and graphics in presence of complex layouts. However, for many non-Latin scripts, segmentation becomes a ch...
K. S. Kumar, S. Kumar, C. V. Jawahar
121
Voted
SUTC
2006
IEEE
15 years 10 months ago
The Computational Complexity of Enforceability Validation for Generic Access Control Rules
In computer security, many researches have tackled on the possibility of a unified model of access control, which could enforce any access control policies within a single unified...
Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo
CSCW
2006
ACM
15 years 10 months ago
Sandboxes: supporting social play through collaborative multimedia composition on mobile phones
Media sharing over mobile devices is quickly becoming a common practice, used to support a variety of social processes. Most existing systems employ a model of sharing that treats...
David Fono, Scott Counts