Sciweavers

2116 search results - page 97 / 424
» Resource Analysis by Sup-interpretation
Sort
View
133
Voted
DCC
2005
IEEE
15 years 9 months ago
JPEG2000 and Motion JPEG2000 Content Analysis Using Codestream Length Information
The widespread adoption of the JPEG2000 standard calls for the development of computationally efficient algorithms to analyze the content of imagery compressed using this standard...
Ali Tabesh, Ali Bilgin, Karthik Krishnan, Michael ...
134
Voted
ICECCS
2005
IEEE
136views Hardware» more  ICECCS 2005»
15 years 9 months ago
Model-Based Design and Analysis of Permission-Based Security
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions rely on certai...
Jan Jürjens, Markus Lehrhuber, Guido Wimmel
116
Voted
CAISE
2000
Springer
15 years 8 months ago
Conceptual Patterns for Reuse in Information Systems Analysis
: Reuse of already existing resources and solutions has always been a strategy for reducing the costs in the information systems development process. Construction and organization ...
Petia Wohed
153
Voted
IPPS
1999
IEEE
15 years 7 months ago
Compiler Analysis to Support Compiled Communication for HPF-Like Programs
By managing network resources at compile time, the compiled communication technique greatly improves the communication performance for communication patterns that are known at com...
Xin Yuan, Rajiv Gupta, Rami G. Melhem
129
Voted
RIDE
1999
IEEE
15 years 7 months ago
Modeling and Analysis of Interactions in Virtual Enterprises
Advances in computer networking technology and open system standards are making the creation and management of virtual enterprises feasible. A virtual enterprise is a temporary co...
Hasan Davulcu, Michael Kifer, L. Robert Pokorny, C...