Sciweavers

568 search results - page 52 / 114
» Enforcing traceability in software
Sort
View
329
Voted
SYNASC
2008
IEEE
300views Algorithms» more  SYNASC 2008»
15 years 9 months ago
A Theory of Adaptable Contract-Based Service Composition
Service Oriented Architectures draw heavily on techniques for reusing and assembling off-the-shelf software components. While powerful, this programming practice is not without a ...
Giovanni Bernardi, Michele Bugliesi, Damiano Maced...
100
Voted
EEE
2005
IEEE
15 years 8 months ago
Flexible Application Rights Management in a Pervasive Environment
The development and wider use of wireless networks and mobile devices has led to novel pervasive computing environments which pose new problems for software rights management and ...
Ivana Dusparic, Dominik Dahlem, Jim Dowling
132
Voted
IUI
2012
ACM
13 years 10 months ago
Mobile texting: can post-ASR correction solve the issues? an experimental study on gain vs. costs
The next big step in embedded, mobile speech recognition will be to allow completely free input as it is needed for messaging like SMS or email. However, unconstrained dictation r...
Michael Feld, Saeedeh Momtazi, Farina Freigang, Di...
147
Voted
PAMI
2012
13 years 5 months ago
Face Recognition Using Sparse Approximated Nearest Points between Image Sets
—We propose an efficient and robust solution for image set classification. A joint representation of an image set is proposed which includes the image samples of the set and thei...
Yiqun Hu, Ajmal S. Mian, Robyn A. Owens
159
Voted
ACMMSP
2006
ACM
252views Hardware» more  ACMMSP 2006»
15 years 8 months ago
Deconstructing process isolation
Most operating systems enforce process isolation through hardware protection mechanisms such as memory segmentation, page mapping, and differentiated user and kernel instructions....
Mark Aiken, Manuel Fähndrich, Chris Hawblitze...