Sciweavers

1886 search results - page 336 / 378
» Modeling and Enacting Software Processes Using VRPML
Sort
View
117
Voted
EUROSYS
2007
ACM
15 years 11 months ago
Comparing the performance of web server architectures
In this paper, we extensively tune and then compare the performance of web servers based on three different server architectures. The µserver utilizes an event-driven architectur...
David Pariag, Tim Brecht, Ashif S. Harji, Peter A....
115
Voted
CLEAR
2007
Springer
144views Biometrics» more  CLEAR 2007»
15 years 8 months ago
The SRI-ICSI Spring 2007 Meeting and Lecture Recognition System
We describe the latest version of the SRI-ICSI meeting and lecture recognition system, as was used in the NIST RT-07 evaluations, highlighting improvements made over the last year....
Andreas Stolcke, Xavier Anguera, Kofi Boakye, &Oum...
ICIP
2003
IEEE
16 years 4 months ago
VISIRE: photorealistic 3D reconstruction from video sequences
Traditionally, building 3D reconstructions of large scenarios such as a museum or historical site has been costly, time consuming and required the contribution of expert personnel...
Tomás Rodríguez, Peter F. Sturm, Mar...
128
Voted
CCS
2007
ACM
15 years 8 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder
127
Voted
CHI
2005
ACM
16 years 2 months ago
Privacy and proportionality: adapting legal evaluation techniques to inform design in ubiquitous computing
We argue that an analytic proportionality assessment balancing usefulness and burden on individual or group privacy must be conducted throughout the design process to create accep...
Giovanni Iachello, Gregory D. Abowd