Sciweavers

3368 search results - page 502 / 674
» The Complexity of Query Reliability
Sort
View
123
Voted
ICECCS
2005
IEEE
86views Hardware» more  ICECCS 2005»
15 years 8 months ago
Exploiting OS-Level Mechanisms to Implement Mobile Code Security
Mobile code systems provide an infrastructure that supports autonomous mobile components, called mobile agents. The infrastructure implements services for the transfer, execution,...
Viktoria Felmetsger, Giovanni Vigna
127
Voted
ICRA
2005
IEEE
134views Robotics» more  ICRA 2005»
15 years 8 months ago
Robust Object Detection at Regions of Interest with an Application in Ball Recognition
— In this paper, we present a new combination of a biologically inspired attention system (VOCUS – Visual Object detection with a CompUtational attention System) with a robust ...
Sara Mitri, Simone Frintrop, Kai Pervölz, Har...
122
Voted
IPPS
2005
IEEE
15 years 8 months ago
Virtual Gateways in the DECOS Integrated Architecture
— The DECOS architecture aims at combining the advantages of federated and integrated systems. The DECOS architecture divides the overall system into a set of nearly-independent ...
Roman Obermaisser, Philipp Peti, Hermann Kopetz
RTSS
2005
IEEE
15 years 8 months ago
Generalized Performance Management of Multi-Class Real-Time Imprecise Data Services
The intricacy of real-time data service management increases mainly due to the emergence of applications operating in open and unpredictable environments, increases in software co...
Mehdi Amirijoo, Nicolas Chaufette, Jörgen Han...
VL
2005
IEEE
159views Visual Languages» more  VL 2005»
15 years 8 months ago
Executable Visual Contracts
Design by Contract (DbC) is widely acknowledged to be a powerful technique for creating reliable software. DbC allows developers to specify the behavior of an operation precisely ...
Marc Lohmann, Stefan Sauer, Gregor Engels