Sciweavers

622 search results - page 79 / 125
» Organizer's Report
Sort
View
SOUPS
2010
ACM
14 years 2 months ago
Optimizing a policy authoring framework for security and privacy policies
Policies which address security and privacy are pervasive parts of both technical and social systems, and technology to enable both organizations and individuals to create and man...
Maritza Johnson, John Karat, Clare-Marie Karat, Ke...
DSD
2009
IEEE
147views Hardware» more  DSD 2009»
14 years 2 months ago
A High Performance Hardware Architecture for One Bit Transform Based Motion Estimation
Motion Estimation (ME) is the most computationally intensive part of video compression and video enhancement systems. One bit transform (1BT) based ME algorithms have low computat...
Abdulkadir Akin, Yigit Dogan, Ilker Hamzaoglu
ESEM
2009
ACM
14 years 2 months ago
Test coverage and post-verification defects: A multiple case study
Test coverage is a promising measure of test effectiveness and development organizations are interested in costeffective levels of coverage that provide sufficient fault removal w...
Audris Mockus, Nachiappan Nagappan, Trung T. Dinh-...
3DPVT
2004
IEEE
119views Visualization» more  3DPVT 2004»
14 years 2 months ago
Frequency Domain Registration of Computer Tomography Data
This paper presents a new method for registering computer tomography (CT) volumetric data of human bone structures relative to observations made at different times. The system we ...
Marco Andreetto, Guido Maria Cortelazzo, Luca Lucc...
ACMDIS
2006
ACM
14 years 2 months ago
Randomness as a resource for design
Randomness is being harnessed in the design of some interactive systems. This is observed in random blogs, random web searching, and in particular Apple's iPod Shuffle. Yet t...
Tuck Wah Leong, Frank Vetere, Steve Howard