Sciweavers

973 search results - page 111 / 195
» Arguing Using Opponent Models
Sort
View
KBSE
2009
IEEE
14 years 2 months ago
Understanding the Value of Software Engineering Technologies
SEESAW combines AI search tools, a Monte Carlo simulator, and some software process models. We show here that, when selecting technologies for a software project, SEESAW out-perfo...
Phillip Green II, Tim Menzies, Steve Williams, Ous...
DATE
2007
IEEE
74views Hardware» more  DATE 2007»
14 years 2 months ago
Joint consideration of fault-tolerance, energy-efficiency and performance in on-chip networks
High reliability against noise, low energy consumption and high performance are key objectives in the design of on-chip networks. Recently some researchers have considered the var...
Alireza Ejlali, Bashir M. Al-Hashimi, Paul M. Rosi...
ICDAR
2007
IEEE
14 years 2 months ago
On Segmentation of Documents in Complex Scripts
Document image segmentation algorithms primarily aim at separating text and graphics in presence of complex layouts. However, for many non-Latin scripts, segmentation becomes a ch...
K. S. Kumar, S. Kumar, C. V. Jawahar
SUTC
2006
IEEE
14 years 1 months ago
The Computational Complexity of Enforceability Validation for Generic Access Control Rules
In computer security, many researches have tackled on the possibility of a unified model of access control, which could enforce any access control policies within a single unified...
Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo
CSCW
2006
ACM
14 years 1 months ago
Sandboxes: supporting social play through collaborative multimedia composition on mobile phones
Media sharing over mobile devices is quickly becoming a common practice, used to support a variety of social processes. Most existing systems employ a model of sharing that treats...
David Fono, Scott Counts