Sciweavers

747 search results - page 75 / 150
» Toward a software development methodology for anonymity appl...
Sort
View
ACIVS
2008
Springer
14 years 3 months ago
Towards Fully Automatic Image Segmentation Evaluation
Spatial region (image) segmentation is a fundamental step for many computer vision applications. Although many methods have been proposed, less work has been done in developing sui...
Lutz Goldmann, Tomasz Adamek, Peter Vajda, Mustafa...
DATE
2003
IEEE
115views Hardware» more  DATE 2003»
14 years 2 months ago
Embedded Software in Digital AM-FM Chipset
The new standard DRM for digital radio broadcast in AM band requires integrated devices for radio receivers at low cost and very low power consumption. A chipset is currently desi...
Michel Sarlotte, Bernard Candaele, J. Quevremont, ...
EUROPAR
2010
Springer
13 years 10 months ago
Multithreaded Geant4: Semi-automatic Transformation into Scalable Thread-Parallel Software
This work presents an application case study. Geant4 is a 750,000 line toolkit first designed in the mid-1990s and originally intended only for sequential computation. Intel's...
Xin Dong 0004, Gene Cooperman, John Apostolakis
ECBS
2007
IEEE
209views Hardware» more  ECBS 2007»
14 years 3 months ago
Aspect-Oriented Modeling of Ubiquitous Web Applications: The aspectWebML Approach
Ubiquitous web applications (UWA) are required to be customizable, meaning their services need to be adaptable towards the context of use, e.g., user, location, time, and device. ...
Andrea Schauerhuber, Manuel Wimmer, Wieland Schwin...
VEE
2012
ACM
238views Virtualization» more  VEE 2012»
12 years 4 months ago
Replacement attacks against VM-protected applications
Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software p...
Sudeep Ghosh, Jason Hiser, Jack W. Davidson