Sciweavers

1729 search results - page 180 / 346
» Deterministic Expressions in C
Sort
View
AVSS
2007
IEEE
15 years 10 months ago
Towards robust face recognition for Intelligent-CCTV based surveillance using one gallery image
In recent years, the use of Intelligent Closed-Circuit Television (ICCTV) for crime prevention and detection has attracted significant attention. Existing face recognition system...
Ting Shan, Shaokang Chen, Conrad Sanderson, Brian ...
KBSE
2007
IEEE
15 years 10 months ago
Keyword programming in java
Keyword programming is a novel technique for reducing the need to remember details of programming language syntax and APIs, by translating a small number of keywords provided by t...
Greg Little, Robert C. Miller
ACSC
2006
IEEE
15 years 10 months ago
Programming with heterogeneous structures: manipulating XML data using bondi
Manipulating semistructured data, such as XML, does not t well within conventional programming languages. A typical manipulation requires nding all occurrences of a structure matc...
F. Y. Huang, C. B. Jay, David B. Skillicorn
CSFW
2006
IEEE
15 years 10 months ago
Policy Analysis for Administrative Role Based Access Control
Role-Based Access Control (RBAC) is a widely used model for expressing access control policies. In large organizations, the RBAC policy may be collectively managed by many adminis...
Amit Sasturkar, Ping Yang, Scott D. Stoller, C. R....
KBSE
2006
IEEE
15 years 10 months ago
A Portable Compiler-Integrated Approach to Permanent Checking
Program checking technology is now a mature technology, but is not yet used on a large scale. We identify one cause of this gap in the decoupling of checking tools from the everyd...
Eugen-Nicolae Volanschi