Sciweavers

1210 search results - page 150 / 242
» Specifying Precise Use Cases with Use Case Charts
Sort
View
CCS
2009
ACM
14 years 3 months ago
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
Third-party cloud computing represents the promise of outsourcing as applied to computation. Services, such as Microsoft’s Azure and Amazon’s EC2, allow users to instantiate v...
Thomas Ristenpart, Eran Tromer, Hovav Shacham, Ste...
COMSWARE
2008
IEEE
14 years 3 months ago
Experimental analysis of RSSI-based location estimation in wireless sensor networks
—With a widespread increase in the number of mobile wireless systems and applications, the need for location aware services has risen at a very high pace in the last few years. M...
Mohit Saxena, Puneet Gupta, Bijendra N. Jain
ICTAI
2008
IEEE
14 years 3 months ago
Fuzzy Information Retrieval Model Based on Multiple Related Ontologies
– With the World Wide Web popularity the information retrieval area has a new challenge intending to retrieve information resources by their meaning by using a knowledge base. No...
Maria Angelica A. Leite, Ivan L. M. Ricarte
SCIA
2007
Springer
162views Image Analysis» more  SCIA 2007»
14 years 3 months ago
A Robust Approach for 3D Cars Reconstruction
Computing high quality 3D models from multi-view stereo reconstruction is an active topic as can be seen in a recent review [15]. Most approaches make the strong assumption that th...
Adrien Auclair, Laurent D. Cohen, Nicole Vincent
DFT
2006
IEEE
74views VLSI» more  DFT 2006»
14 years 3 months ago
Recovery Mechanisms for Dual Core Architectures
Dual core architectures are commonly used to establish fault tolerance on the node level. Since comparison is usually performed for the outputs only, no precise diagnostic informa...
Christian El Salloum, Andreas Steininger, Peter Tu...