Sciweavers

286 search results - page 38 / 58
» Crypto Engineering: Some History and Some Case Studies
Sort
View
ECSA
2008
Springer
13 years 9 months ago
Automating Architecture Trade-Off Decision Making through a Complex Multi-attribute Decision Process
A typical software architecture design process requires the architects to make various trade-off architecture decisions. The architects need to consider different possibilities and...
Majid Makki, Ebrahim Bagheri, Ali A. Ghorbani
PAMI
2012
11 years 10 months ago
A Blur-Robust Descriptor with Applications to Face Recognition
—Understanding the effect of blur is an important problem in unconstrained visual analysis. We address this problem in the context of image-based recognition, by a fusion of imag...
Raghuraman Gopalan, Sima Taheri, Pavan K. Turaga, ...
MSR
2006
ACM
14 years 1 months ago
Geographic location of developers at SourceForge
The development of libre (free/open source) software is usually performed by geographically distributed teams. Participation in most cases is voluntary, sometimes sporadic, and of...
Gregorio Robles, Jesús M. González-B...
ICSE
2008
IEEE-ACM
14 years 7 months ago
Security metrics for source code structures
Software security metrics are measurements to assess security related imperfections (or perfections) introduced during software development. A number of security metrics have been...
Istehad Chowdhury, Brian Chan, Mohammad Zulkernine
CGO
2010
IEEE
14 years 2 months ago
Towards program optimization through automated analysis of numerical precision
Reducing the arithmetic precision of a computation has real performance implications, including increased speed, decreased power consumption, and a smaller memory footprint. For s...
Michael D. Linderman, Matthew Ho, David L. Dill, T...