Sciweavers

3765 search results - page 642 / 753
» Qualitative Action Systems
Sort
View
SOUPS
2010
ACM
15 years 7 months ago
On the impact of real-time feedback on users' behaviour in mobile location-sharing applications
Effective privacy management requires that mobile systems‟ users be able to make informed privacy decisions as their experience and knowledge of a system progresses. Prior work ...
Lukasz Jedrzejczyk, Blaine A. Price, Arosha K. Ban...
126
Voted
ECBS
2009
IEEE
114views Hardware» more  ECBS 2009»
15 years 7 months ago
Model-Based Product-Oriented Certification
Future space missions such as the Mars Science Laboratory and Project Constellation suggest the engineering of some of the most complex man-rated software systems. The present pro...
Damian Dechev, Bjarne Stroustrup
MVA
2000
164views Computer Vision» more  MVA 2000»
15 years 5 months ago
Visual Screen: Transforming an Ordinary Screen into a Touch Screen
Touch screens are very convenient because one can directly point to where it is interesting. This paper presents an inexpensive technique to transform an ordinary screen into a to...
Zhengyou Zhang, Ying Shan
IJNSEC
2008
131views more  IJNSEC 2008»
15 years 3 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
201
Voted
ICDE
2004
IEEE
94views Database» more  ICDE 2004»
16 years 5 months ago
SQLCM: A Continuous Monitoring Framework for Relational Database Engines
The ability to monitor a database server is crucial for effective database administration. Today's commercial database systems support two basic mechanisms for monitoring: (a...
Arnd Christian König, Surajit Chaudhuri, Vive...