Sciweavers

16160 search results - page 3145 / 3232
» How to approach humans
Sort
View
ACSAC
2002
IEEE
14 years 1 months ago
Composable Tools For Network Discovery and Security Analysis
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...
IDEAS
2002
IEEE
113views Database» more  IDEAS 2002»
14 years 1 months ago
Scalable QoS-Aware Disk-Scheduling
A new quality of service (QoS) aware disk scheduling algorithm is presented. It is applicable in environments where data requests arrive with different QoS requirements such as re...
Walid G. Aref, Khaled El-Bassyouni, Ibrahim Kamel,...
KBSE
2002
IEEE
14 years 1 months ago
Report on the Workshop on the State of the Art in Automated Software Engineering
ort gives their abstracts. s of the position papers Recent Experiences with Code Generation and Task Automation Agents in Software Tools (J. Grundy, J. Hosking) As software grows i...
Yves Ledru, David F. Redmiles
LICS
2002
IEEE
14 years 1 months ago
Computational Adequacy for Recursive Types in Models of Intuitionistic Set Theory
This paper provides a unifying axiomatic account of the interpretation of recursive types that incorporates both domain-theoretic and realizability models as concrete instances. O...
Alex K. Simpson
PG
2002
IEEE
14 years 1 months ago
Estimation of Multiple Directional Light Sources for Synthesis of Mixed Reality Images
We present a new method for the detection and estimation of multiple directional illuminants, using a single image of any object with known geometry and Lambertian reflectance. W...
Yang Wang, Dimitris Samaras
« Prev « First page 3145 / 3232 Last » Next »