Sciweavers

942 search results - page 85 / 189
» From System Comprehension to Program Comprehension
Sort
View
DEXAW
1999
IEEE
75views Database» more  DEXAW 1999»
14 years 1 months ago
Coordination of Security Levels for Internet Architectures
Internet systems provide a variety of ways to exchange information, contain large amounts and variety of data, and have become quite complex, making them vulnerable to attacks fro...
Eduardo B. Fernández
ICIP
2005
IEEE
14 years 10 months ago
Comparative study: face recognition on unspecific persons using linear subspace methods
Recently many Automatic Face Recognition (AFR) systems were developed for applications with unspecific persons, which is different from conventional pattern recognition problems wh...
Dahua Lin, Shuicheng Yan, Xiaoou Tang
SI3D
2009
ACM
14 years 3 months ago
Fast high-quality line visibility
Lines drawn over or in place of shaded 3D models can often provide greater comprehensibility and stylistic freedom that shading alone. A substantial challenge for making stylized ...
Forrester Cole, Adam Finkelstein
ICMCS
2008
IEEE
129views Multimedia» more  ICMCS 2008»
14 years 3 months ago
Evaluation of segment-based proxy caching for video on demand
In this paper, we derive an analytical model for the evaluation of the performance of a Video on Demand (VoD) system. The model estimates the mean waiting time achievable by the P...
Muhammad Muhammad, Wei Tu, Eckehard G. Steinbach
WCRE
2008
IEEE
14 years 3 months ago
Pitfalls in Aspect Mining
The research domain of aspect mining studies the problem of (semi-)automatically identifying potential aspects and crosscutting concerns in a software system, to improve the syste...
Kim Mens, Andy Kellens, Jens Krinke