Sciweavers

211 search results - page 38 / 43
» Modeling security as a dependability attribute: a refinement...
Sort
View
SAC
2006
ACM
14 years 1 months ago
Proactive resilience through architectural hybridization
In a recent work, we have shown that it is not possible to dependably build any type of distributed f fault or intrusiontolerant system under the asynchronous model. This result f...
Paulo Sousa, Nuno Ferreira Neves, Paulo Verí...
SIGOPSE
1998
ACM
13 years 11 months ago
Nested Java processes: OS structure for mobile code
The majority of work on protection in single-language mobile code environments focuses on information security issues and depends on the language environment for solutions to the ...
Patrick Tullmann, Jay Lepreau
MM
2009
ACM
252views Multimedia» more  MM 2009»
14 years 2 months ago
Localizing volumetric motion for action recognition in realistic videos
This paper presents a novel motion localization approach for recognizing actions and events in real videos. Examples include StandUp and Kiss in Hollywood movies. The challenge ca...
Xiao Wu, Chong-Wah Ngo, Jintao Li, Yongdong Zhang
EAAI
2007
87views more  EAAI 2007»
13 years 7 months ago
Experience-based service provider selection in agent-mediated E-Commerce
For a given service demand, it is necessary to select a suitable service provider among many possibilities. An accurate selection is difficult when consumers do not have a signi...
Murat Sensoy, F. Canan Pembe, Hande Zirtiloglu, Pi...
OOPSLA
2009
Springer
14 years 2 months ago
Towards automation of iteration planning
Iterations are time-boxed periods with an intended outcome that is often a set of implemented requirements. Iterations are part of most common software development lifecycle model...
Jonas Helming, Maximilian Koegel, Zardosht Hodaie