Sciweavers

2421 search results - page 413 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
SAC
2009
ACM
14 years 4 months ago
Applying Reo to service coordination in long-running business transactions
Ensuring transactional behavior of business processes and web service compositions is an essential issue in the area of serviceoriented computing. Transactions in this context may ...
Natallia Kokash, Farhad Arbab
DSN
2009
IEEE
14 years 4 months ago
Data management mechanisms for embedded system gateways
It is becoming increasingly common to connect traditional embedded system networks to the Internet for remote monitoring, high-level control and integration. It is necessary to pr...
Justin Ray, Philip Koopman
ISLPED
2009
ACM
132views Hardware» more  ISLPED 2009»
14 years 4 months ago
Enabling ultra low voltage system operation by tolerating on-chip cache failures
Extreme technology integration in the sub-micron regime comes with a rapid rise in heat dissipation and power density for modern processors. Dynamic voltage scaling is a widely us...
Amin Ansari, Shuguang Feng, Shantanu Gupta, Scott ...
ACCV
2007
Springer
14 years 4 months ago
Analyzing Facial Expression by Fusing Manifolds
Feature representation and classification are two major issues in facial expression analysis. In the past, most methods used either holistic or local representation for analysis. ...
Wen-Yan Chang, Chu-Song Chen, Yi-Ping Hung
ESA
2005
Springer
125views Algorithms» more  ESA 2005»
14 years 3 months ago
Online Primal-Dual Algorithms for Covering and Packing Problems
We study a wide range of online covering and packing optimization problems. In an online covering problem a linear cost function is known in advance, but the linear constraints th...
Niv Buchbinder, Joseph Naor