Sciweavers

1527 search results - page 215 / 306
» From Requirements to Design: Formalizing the Key Steps
Sort
View
IEEECIT
2006
IEEE
14 years 3 months ago
A Trap-based Mechanism for Runtime Kernel Modification
Runtime modification of kernel code is a difficult problem. However, the need of modifiable kernel is increasing because new requirements and services that are unanticipated at th...
Young-Pil Kim, Jin-Hee Choi, Chuck Yoo
ACSAC
2005
IEEE
14 years 2 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji
SSDBM
2005
IEEE
128views Database» more  SSDBM 2005»
14 years 2 months ago
Fuzzy Decomposition of Spatially Extended Objects
Modern database applications including computer-aided design, multimedia information systems, medical imaging, molecular biology, or geographical information systems impose new re...
Hans-Peter Kriegel, Martin Pfeifle
IPPS
2003
IEEE
14 years 2 months ago
Performance Monitoring and Evaluation of a UPC Implementation on a NUMA Architecture
UPC is an explicit parallel extension of ANSI C, which has been gaining rising attention from vendors and users. In this work, we consider the low-level monitoring and experimenta...
François Cantonnet, Yiyi Yao, Smita Annared...
CAIP
2003
Springer
176views Image Analysis» more  CAIP 2003»
14 years 2 months ago
Evaluation of an Adaptive Composite Gaussian Model in Video Surveillance
Video surveillance systems seek to automatically identify events of interest in a variety of situations. Extracting a moving object from background is the most important step of t...
Qi Zang, Reinhard Klette