Sciweavers

4359 search results - page 854 / 872
» Automated Pipeline Design
Sort
View
ICSE
2001
IEEE-ACM
14 years 12 days ago
The Coming-of-Age of Software Architecture Research
Over the past decade, software architecture research has emerged as the principled study of the overall structure of software systems, especially the relations among subsystems an...
Mary M. Shaw
SIGUCCS
2000
ACM
14 years 9 days ago
Knowledgebase Integration with a 24-hour Help Desk
The University of Pittsburgh's Computing Services and Systems Development organization is focused on the needs of the faculty and student population, totaling nearly 40,000 u...
Jay Graham, Brian K. Hart
ICPR
2010
IEEE
14 years 9 days ago
Detecting Altered Fingerprints
Abstract--The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring t...
Jianjiang Feng, Anil Jain, Arun Ross
CRYPTO
2000
Springer
134views Cryptology» more  CRYPTO 2000»
14 years 9 days ago
Taming the Adversary
Abstract. While there is a great deal of sophistication in modern cryptology, simple (and simplistic) explanations of cryptography remain useful and perhaps necessary. Many of the ...
Martín Abadi
HICSS
2010
IEEE
166views Biometrics» more  HICSS 2010»
14 years 9 days ago
VrtProf: Vertical Profiling for System Virtualization
As data centers and end users become increasingly reliant on virtualization technology, more efficient and accurate methods of profiling such systems are needed. However, under vir...
Hussam Mousa, Kshitij Doshi, Timothy Sherwood, ElM...