Sciweavers

406 search results - page 56 / 82
» Identifying Codes and Covering Problems
Sort
View
ICFP
2009
ACM
14 years 9 months ago
A theory of typed coercions and its applications
A number of important program rewriting scenarios can be recast as type-directed coercion insertion. These range from more theoretical applications such as coercive subtyping and ...
Nikhil Swamy, Michael W. Hicks, Gavin M. Bierman
ICIP
2008
IEEE
14 years 3 months ago
H.264/AVC video scrambling for privacy protection
In this paper, we address the problem of privacy in video surveillance systems. More specifically, we consider the case of H.264/AVC which is the state-of-the-art in video coding....
Frédéric Dufaux, Touradj Ebrahimi
IWPC
2007
IEEE
14 years 2 months ago
Tracking Objects to Detect Feature Dependencies
The domain-specific ontology of a software system includes a set of features and their relationships. While the problem of locating features in object-oriented programs has been ...
Adrian Lienhard, Orla Greevy, Oscar Nierstrasz
ASPDAC
2006
ACM
109views Hardware» more  ASPDAC 2006»
14 years 2 months ago
Energy savings through embedded processing on disk system
Abstract— Many of today’s data-intensive applications manipulate disk-resident data sets. As a result, their overall behavior is tightly coupled with their disk performance. Un...
Seung Woo Son, Guangyu Chen, Mahmut T. Kandemir, F...
HICSS
2003
IEEE
153views Biometrics» more  HICSS 2003»
14 years 1 months ago
Automatic Mediation between Incompatible Component Interaction Styles
Incompatibility of component interaction styles is identified as a major obstacle to interoperability when using off-the-shelf components or dealing with legacy software in compos...
Klaus-Peter Löhr