Sciweavers

769 search results - page 126 / 154
» Identifying objects in legacy systems
Sort
View
IFIP
2001
Springer
14 years 3 days ago
Security Documentation
Effective security management depends upon good risk management, which is itself based upon a reliable risk assessment, involving data collection of all the facets influencing sys...
Lam-for Kwok, Peggy P. K. Fung, Dennis Longley
ISVC
2009
Springer
14 years 2 months ago
A Novel Method for Enhanced Needle Localization Using Ultrasound-Guidance
Abstract. In this paper, we propose a novel and fast method to localize and track needles during image-guided interventions. Our proposed method is comprised of framework of needle...
Bin Dong, Eric Savitsky, Stanley Osher
PLDI
2010
ACM
13 years 11 months ago
Detecting Inefficiently-Used Containers to Avoid Bloat
Runtime bloat degrades significantly the performance and scalability of software systems. An important source of bloat is the inefficient use of containers. It is expensive to cre...
Guoqing Xu, Atanas Rountev
ER
2007
Springer
157views Database» more  ER 2007»
14 years 1 months ago
Perceived vs. Measured Quality of Conceptual Schemas: An Experimental Comparison
Frequently the behaviour of an information system is functionally correct, but it does not meet some quality criteria, such as completeness, consistency, and usability. One way to...
Samira Si-Said Cherfi, Jacky Akoka, Isabelle Comyn...
UIST
2004
ACM
14 years 1 months ago
Hierarchical parsing and recognition of hand-sketched diagrams
A long standing challenge in pen-based computer interaction is the ability to make sense of informal sketches. A main difficulty lies in reliably extracting and recognizing the i...
Levent Burak Kara, Thomas F. Stahovich