Sciweavers

271 search results - page 17 / 55
» From Trust to Dependability through Risk Analysis
Sort
View
HUC
1999
Springer
14 years 15 hour ago
The Role of Connectivity in Supporting Context-Sensitive Applications
This paper considers the role of network connectivity in supporting context-sensitive applications. A range of context-sensitive applications are analysed with respect to connectiv...
Keith Cheverst, Nigel Davies, Keith Mitchell, Adri...
IBPRIA
2005
Springer
14 years 1 months ago
Discriminative Face Recognition Through Gabor Responses and Sketch Distortion
We present an inherently discriminative approach to face recognition. This is achieved by automatically selecting key points from lines that sketch the face and extracting textural...
Daniel González-Jiménez, José...
ACSAC
2003
IEEE
14 years 1 months ago
Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs
In-depth analysis of network security vulnerability must consider attacker exploits not just in isolation, but also in combination. The general approach to this problem is to comp...
Steven Noel, Sushil Jajodia, Brian O'Berry, Michae...
IV
2007
IEEE
139views Visualization» more  IV 2007»
14 years 2 months ago
Investigating perceptual responses and shared understanding of architectural design ideas when communicated through different fo
Research to date has demonstrated the apparent differences how architects, as ‘experts’ and members of the public as ‘non-experts’ perceive and understand visual represent...
Nada Bates-Brkljac
SAC
2008
ACM
13 years 7 months ago
Optimizing code through iterative specialization
Code specialization is a way to obtain significant improvement in the performance of an application. It works by exposing values of different parameters in source code. The availa...
Minhaj Ahmad Khan, Henri-Pierre Charles, Denis Bar...