Sciweavers

134 search results - page 7 / 27
» Detecting Clones in Business Applications
Sort
View
ICASSP
2010
IEEE
13 years 10 months ago
Geometric tampering estimation by means of a SIFT-based forensic analysis
In many application scenarios digital images play a basic role and often it is important to assess if their content is realistic or has been manipulated to mislead watcher’s opi...
Irene Amerini, Lamberto Ballan, Roberto Caldelli, ...
DSOM
2006
Springer
14 years 1 months ago
Detecting Bottleneck in n-Tier IT Applications Through Analysis
As the complexity of large-scale enterprise applications increases, providing performance verification through staging becomes an important part of reducing business risks associat...
Gueyoung Jung, Galen S. Swint, Jason Parekh, Calto...
JCIT
2008
165views more  JCIT 2008»
13 years 9 months ago
Mining Processes using cluster approach for representing workflows
Although much attention is being paid to business Intelligence during the past decades, the design for applying business Intelligence and particularly in a workflow processes is s...
N. P. Kavya, M. V. Sathyanarayana, N. C. Naveen
ICST
2008
IEEE
14 years 4 months ago
Test-Driven Assessment of Access Control in Legacy Applications
If access control policy decision points are not neatly separated from the business logic of a system, the evolution of a security policy likely leads to the necessity of changing...
Yves Le Traon, Tejeddine Mouelhi, Alexander Pretsc...
MMM
2007
Springer
181views Multimedia» more  MMM 2007»
14 years 4 months ago
Hardware Accelerated Skin Deformation for Animated Crowds
Real time rendering of animated crowds has many practical multimedia applications. The Graphics Processor Unit (GPU) is being increasingly employed to accelerate associated renderi...
Golam Ashraf, Junyu Zhou