Sciweavers

4923 search results - page 975 / 985
» Software Risk Management
Sort
View
MMS
2008
13 years 7 months ago
Canonical processes for creating personalized semantically rich multimedia presentations
Authoring of multimedia content can be considered as composing media assets such as images, videos, text, and audio in time, space, and interaction into a coherent multimedia pres...
Ansgar Scherp
LOBJET
2006
196views more  LOBJET 2006»
13 years 7 months ago
Mapping High-Level Business Rules To and Through Aspects
Many object-oriented software applications contain implicit business rules. Although there exist many approaches that advocate the separation of rules, the rules' connections ...
María Agustina Cibrán, Maja D'Hondt,...
FGCS
2007
146views more  FGCS 2007»
13 years 7 months ago
Distributed medical images analysis on a Grid infrastructure
In this paper medical applications on a Grid infrastructure, the MAGIC-5 Project, are presented and discussed. MAGIC-5 aims at developing Computer Aided Detection (CADe) software ...
Roberto Bellotti, Piergiorgio Cerello, S. Tangaro,...
SCP
2008
128views more  SCP 2008»
13 years 7 months ago
Mobile JikesRVM: A framework to support transparent Java thread migration
Today's complex applications must face the distribution of data and code among different network nodes. Computation in distributed contexts is demanding increasingly powerful...
Raffaele Quitadamo, Giacomo Cabri, Letizia Leonard...
SIGMETRICS
2008
ACM
214views Hardware» more  SIGMETRICS 2008»
13 years 7 months ago
HMTT: a platform independent full-system memory trace monitoring system
Memory trace analysis is an important technology for architecture research, system software (i.e., OS, compiler) optimization, and application performance improvements. Many appro...
Yungang Bao, Mingyu Chen, Yuan Ruan, Li Liu, Jianp...