Sciweavers

1622 search results - page 314 / 325
» Deriving Software Process Simulation Model from SPEM-based S...
Sort
View
CASES
2006
ACM
14 years 1 months ago
Extensible control architectures
Architectural advances of modern systems has often been at odds with control complexity, requiring significant effort in both design and verification. This is particularly true ...
Greg Hoover, Forrest Brewer, Timothy Sherwood
LISA
2007
13 years 10 months ago
Secure Isolation of Untrusted Legacy Applications
Existing applications often contain security holes that are not patched until after the system has already been compromised. Even when software updates are available, applying the...
Shaya Potter, Jason Nieh, Matt Selsky
CIVR
2008
Springer
127views Image Analysis» more  CIVR 2008»
13 years 9 months ago
Performance evaluation of relevance feedback methods
In this paper we review the evaluation of relevance feedback methods for content-based image retrieval systems. We start out by presenting an overview of current common practice, ...
Mark J. Huiskes, Michael S. Lew
FPL
2008
Springer
207views Hardware» more  FPL 2008»
13 years 9 months ago
Bitstream compression techniques for Virtex 4 FPGAs
This paper examines the opportunity of using compression for accelerating the (re)configuration of FPGA devices, focusing on the choice of compression algorithms, and their hardwa...
Radu Stefan, Sorin Dan Cotofana
GEOINFO
2004
13 years 9 months ago
Ontology-driven Resolution of Semantic Heterogeneities in GDB Conceptual Schemas
: As the geographic information system (GIS) community grows, more and more people needs to share geographic information. As modern GIS data is stored in geographic databases their...
Guillermo Nudelman Hess, Cirano Iochpe