Sciweavers

12783 search results - page 2486 / 2557
» Experimenting with computing
Sort
View
SOUPS
2010
ACM
14 years 2 months ago
On the impact of real-time feedback on users' behaviour in mobile location-sharing applications
Effective privacy management requires that mobile systems‟ users be able to make informed privacy decisions as their experience and knowledge of a system progresses. Prior work ...
Lukasz Jedrzejczyk, Blaine A. Price, Arosha K. Ban...
GECCO
2007
Springer
206views Optimization» more  GECCO 2007»
14 years 2 months ago
Using code metric histograms and genetic algorithms to perform author identification for software forensics
We have developed a technique to characterize software developers' styles using a set of source code metrics. This style fingerprint can be used to identify the likely author...
Robert Charles Lange, Spiros Mancoridis
EMSOFT
2009
Springer
14 years 2 months ago
Modular static scheduling of synchronous data-flow networks: an efficient symbolic representation
This paper addresses the question of producing modular sequential imperative code from synchronous data-flow networks. Precisely, given a system with several input and output flow...
Marc Pouzet, Pascal Raymond
ICB
2007
Springer
207views Biometrics» more  ICB 2007»
14 years 2 months ago
Super-Resolved Faces for Improved Face Recognition from Surveillance Video
Characteristics of surveillance video generally include low resolution and poor quality due to environmental, storage and processing limitations. It is extremely difficult for comp...
Frank Lin, Clinton Fookes, Vinod Chandran, Sridha ...
ICCCN
2007
IEEE
14 years 2 months ago
Implementation of a Wireless Mesh Network Testbed for Traffic Control
Wireless mesh networks (WMN) have attracted considerable interest in recent years as a convenient, flexible and low-cost alternative to wired communication infrastructures in many ...
Kun-Chan Lan, Zhe Wang, Rodney Berriman, Tim Moors...
« Prev « First page 2486 / 2557 Last » Next »