Sciweavers

8503 search results - page 1543 / 1701
» Secure Software Architectures
Sort
View
AICCSA
2006
IEEE
101views Hardware» more  AICCSA 2006»
14 years 3 months ago
Refactoring Tools and Complementary Techniques
Poorly designed software systems are difficult to understand and maintain. Modifying code in one place could lead to unwanted repercussions elsewhere due to high coupling. Adding ...
Martin Drozdz, Derrick G. Kourie, Bruce W. Watson,...
COMSWARE
2006
IEEE
14 years 3 months ago
Utilizing network features for privacy violation detection
Privacy, its violations and techniques to circumvent privacy violation have grabbed the centre-stage of both academia and industry in recent months. Corporations worldwide have be...
Jaijit Bhattacharya, Rajanish Dass, Vishal Kapoor,...
CRV
2006
IEEE
206views Robotics» more  CRV 2006»
14 years 3 months ago
Toward an Application of Content-Based Video Indexing to Computer- Assisted Descriptive Video
This paper presents the status of a project targeting the development of content-based video indexing tools, to assist a human in the generation of descriptive video for the hard ...
Langis Gagnon, France Laliberté, Marc Lalon...
DATE
2006
IEEE
125views Hardware» more  DATE 2006»
14 years 3 months ago
Formal performance analysis and simulation of UML/SysML models for ESL design
UML2 and SysML try to adopt techniques known from software development to systems engineering. However, the focus has been put on modeling aspects until now and quantitative perfo...
Alexander Viehl, Timo Schönwald, Oliver Bring...
DSD
2006
IEEE
109views Hardware» more  DSD 2006»
14 years 3 months ago
ATOMI II - Framework for Easy Building of Object-oriented Embedded Systems
Traditionally, an embedded system design process demands a considerable amount of expertise, time and money. This makes developing embedded systems difficult for many companies, a...
Tero Vallius, Juha Röning
« Prev « First page 1543 / 1701 Last » Next »