Sciweavers

5101 search results - page 936 / 1021
» Capturing Context Requirements
Sort
View
DAC
2007
ACM
14 years 9 months ago
Trusted Hardware: Can It Be Trustworthy?
Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important co...
Cynthia E. Irvine, Karl N. Levitt
MICCAI
2006
Springer
14 years 8 months ago
Segmentation of Neck Lymph Nodes in CT Datasets with Stable 3D Mass-Spring Models
Abstract. The quantitative assessment of neck lymph nodes in the context of malign tumors requires an ecient segmentation technique for lymph nodes in tomographic 3D datasets. We p...
Bernhard Preim, Gero Strauß, Heiko Seim, Ilk...
SIGSOFT
2009
ACM
14 years 8 months ago
SCA: a semantic conflict analyzer for parallel changes
Parallel changes are becoming increasingly prevalent in the development of large scale software system. To further study the relationship between parallel changes and faults, we h...
Danhua Shao, Sarfraz Khurshid, Dewayne E. Perry
SIGSOFT
2008
ACM
14 years 8 months ago
Explicit exception handling variability in component-based product line architectures
Separation of concerns is one of the overarching goals of exception handling in order to keep separate normal and exceptional behaviour of a software system. In the context of a s...
Ivo Augusto Bertoncello, Marcelo Oliveira Dias, Pa...
WWW
2008
ACM
14 years 8 months ago
A semantic layer for publishing and localizing xml data for a p2p xquery mediator
In this poster, we present the P2P XML data localization layer of XLive, an XQuery mediation system developed at University of Versailles [2]. A major challenge in the evaluation ...
Florin Dragan, Georges Gardarin, Laurent Yeh