Sciweavers

1210 search results - page 185 / 242
» Specifying Precise Use Cases with Use Case Charts
Sort
View
POPL
2012
ACM
12 years 3 months ago
Access permission contracts for scripting languages
The ideal software contract fully specifies the behavior of an operation. Often, in particular in the context of scripting languages, a full specification may be cumbersome to s...
Phillip Heidegger, Annette Bieniusa, Peter Thieman...
ECBS
2009
IEEE
119views Hardware» more  ECBS 2009»
14 years 2 months ago
Software Architectural Design Meets Security Engineering
Security requirements strongly influence the architectural design of complex IT systems in a similar way as other non-functional requirements. Both security engineering as well a...
Stephan Bode, Anja Fischer, Winfried E. Kühnh...
CORR
2007
Springer
133views Education» more  CORR 2007»
13 years 7 months ago
The price of ignorance: The impact of side-information on delay for lossless source-coding
Inspired by the context of compressing encrypted sources, this paper considers the general tradeoff between rate, end-to-end delay, and probability of error for lossless source co...
Cheng Chang, Anant Sahai
CVPR
2008
IEEE
14 years 9 months ago
Finding people in archive films through tracking
The goal of this work is to find all people in archive films. Challenges include low image quality, motion blur, partial occlusion, non-standard poses and crowded scenes. We base ...
Xiaofeng Ren
ECCV
2006
Springer
14 years 9 months ago
Background Cut
Abstract. In this paper, we introduce background cut, a high quality and realtime foreground layer extraction algorithm. From a single video sequence with a moving foreground objec...
Jian Sun, Weiwei Zhang, Xiaoou Tang, Heung-Yeung S...