Sciweavers

4726 search results - page 906 / 946
» Domain Modeling of Software Process Models
Sort
View
LISA
2007
14 years 7 days ago
Secure Isolation of Untrusted Legacy Applications
Existing applications often contain security holes that are not patched until after the system has already been compromised. Even when software updates are available, applying the...
Shaya Potter, Jason Nieh, Matt Selsky
CIVR
2008
Springer
127views Image Analysis» more  CIVR 2008»
13 years 11 months ago
Performance evaluation of relevance feedback methods
In this paper we review the evaluation of relevance feedback methods for content-based image retrieval systems. We start out by presenting an overview of current common practice, ...
Mark J. Huiskes, Michael S. Lew
ATMOS
2007
129views Optimization» more  ATMOS 2007»
13 years 11 months ago
Applied Railway Optimization in Production Planning at DSB S-tog - tasks, tools and challenges
Efficient public transportation is becoming increasingly vital for modern capitals. DSB S-tog a/s is the major supplier of rail traffic on the infrastructure of the city-rail netwo...
Jens Clausen
FMICS
2008
Springer
13 years 11 months ago
Extending Structural Test Coverage Criteria for Lustre Programs with Multi-clock Operators
Lustre is a formal synchronous declarative language widely used for modeling and specifying safety-critical applications in the elds of avionics, transportation or energy productio...
Virginia Papailiopoulou, Laya Madani, Lydie du Bou...
FPL
2008
Springer
207views Hardware» more  FPL 2008»
13 years 11 months ago
Bitstream compression techniques for Virtex 4 FPGAs
This paper examines the opportunity of using compression for accelerating the (re)configuration of FPGA devices, focusing on the choice of compression algorithms, and their hardwa...
Radu Stefan, Sorin Dan Cotofana