Sciweavers

1448 search results - page 127 / 290
» From Requirements to Code Revisited
Sort
View
SCIA
2009
Springer
118views Image Analysis» more  SCIA 2009»
15 years 8 months ago
Grouping of Semantically Similar Image Positions
Features from the Scale Invariant Feature Transformation (SIFT) are widely used for matching between spatially or temporally displaced images. Recently a topology on the SIFT featu...
Lutz Priese, Frank Schmitt, Nils Hering
AAMAS
2010
Springer
15 years 4 months ago
ASPECS: an agent-oriented software process for engineering complex systems
Holonic multiagent systems (HMAS) offers a promising software engineering approach for developing complex open software systems. However the process of building MultiAgent Systems...
Massimo Cossentino, Nicolas Gaud, Vincent Hilaire,...
PPL
2006
81views more  PPL 2006»
15 years 3 months ago
Microthreading a Model for Distributed Instruction-level Concurrency
This paper analyses the micro-threaded model of concurrency making comparisons with both data and instruction-level concurrency. The model is fine grain and provides synchronisati...
Chris R. Jesshope
NDSS
2009
IEEE
15 years 10 months ago
Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense
Cross-site scripting (or XSS) has been the most dominant class of web vulnerabilities in 2007. The main underlying reason for XSS vulnerabilities is that web markup and client-sid...
Yacin Nadji, Prateek Saxena, Dawn Song
CODES
2007
IEEE
15 years 10 months ago
Compile-time decided instruction cache locking using worst-case execution paths
Caches are notorious for their unpredictability. It is difficult or even impossible to predict if a memory access results in a definite cache hit or miss. This unpredictability i...
Heiko Falk, Sascha Plazar, Henrik Theiling