Sciweavers

8623 search results - page 1577 / 1725
» Software engineering for secure systems
Sort
View
IUI
2012
ACM
12 years 4 months ago
Effective browsing and serendipitous discovery with an experience-infused browser
In the digital age, users can have perfect recall of their digital experiences. In this paper, we explore how this recall can be leveraged during web browsing. We have built a sys...
Sudheendra Hangal, Abhinay Nagpal, Monica S. Lam
PAMI
2012
11 years 11 months ago
Trainable Convolution Filters and Their Application to Face Recognition
—In this paper, we present a novel image classification system that is built around a core of trainable filter ensembles that we call Volterra kernel classifiers. Our system trea...
Ritwik Kumar, Arunava Banerjee, Baba C. Vemuri, Ha...
SOSP
2007
ACM
14 years 6 months ago
MUVI: automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs
Software defects significantly reduce system dependability. Among various types of software bugs, semantic and concurrency bugs are two of the most difficult to detect. This pape...
Shan Lu, Soyeon Park, Chongfeng Hu, Xiao Ma, Weiha...
CODES
2005
IEEE
14 years 2 months ago
Aggregating processor free time for energy reduction
Even after carefully tuning the memory characteristics to the application properties and the processor speed, during the execution of real applications there are times when the pr...
Aviral Shrivastava, Eugene Earlie, Nikil D. Dutt, ...
EDBT
2008
ACM
130views Database» more  EDBT 2008»
14 years 9 months ago
Flexible Transaction Processing in the Argos Middleware
Transactional requirements, from new application domains and execution environments, are varying and may exceed traditional ACID properties. We believe that transactional middlewa...
Anna-Brith Arntsen, Marts Mortensen, Randi Karlsen...
« Prev « First page 1577 / 1725 Last » Next »