Sciweavers

1815 search results - page 324 / 363
» Cloud Computing: An Overview
Sort
View
CACM
2010
97views more  CACM 2010»
13 years 7 months ago
Certified software
Certified software consists of a machine-executable program plus a formal machine-checkable proof that the software is free of bugs with respect to a claim of dependability. The c...
Zhong Shao
CGF
2010
129views more  CGF 2010»
13 years 7 months ago
Real Time Animation of Virtual Humans: A Trade-off Between Naturalness and Control
Virtual humans are employed in many interactive applications using 3D virtual environments, including (serious) games. The motion of such virtual humans should look realistic (or ...
Herwin van Welbergen, Ben J. H. van Basten, Arjan ...
CSREASAM
2010
13 years 7 months ago
Keyloggers in Cybersecurity Education
Abstract-- Keylogger programs attempt to retrieve confidential information by covertly capturing user input via keystroke monitoring and then relaying this information to others, o...
Christopher Wood, Rajendra Raj
DEBU
2010
128views more  DEBU 2010»
13 years 7 months ago
Panda: A System for Provenance and Data
Panda (for Provenance and Data) is a new project whose goal is to develop a general-purpose system that unifies concepts from existing provenance systems and overcomes some limita...
Robert Ikeda, Jennifer Widom
DEBU
2010
139views more  DEBU 2010»
13 years 7 months ago
Refining Information Extraction Rules using Data Provenance
Developing high-quality information extraction (IE) rules, or extractors, is an iterative and primarily manual process, extremely time consuming, and error prone. In each iteratio...
Bin Liu 0002, Laura Chiticariu, Vivian Chu, H. V. ...