Sciweavers

211 search results - page 21 / 43
» Towards Security Evaluation Based on Evidence Collection
Sort
View
ICCV
2009
IEEE
15 years 14 days ago
Bayesian selection of scaling laws for motion modeling in images
Based on scaling laws describing the statistical structure of turbulent motion across scales, we propose a multiscale and non-parametric regularizer for optic-flow estimation. R...
Patrick H´eas, Etienne M´emin, Dominique Heitz, ...
CASCON
1996
126views Education» more  CASCON 1996»
13 years 8 months ago
Evaluating the costs of management: a distributed applications management testbed
In today's distributed computing environments, users are makingincreasing demands on the systems, networks, and applications they use. Users are coming to expect performance,...
Michael Katchabaw, Stephen L. Howard, Andrew D. Ma...
ECTEL
2006
Springer
13 years 11 months ago
Towards Community-Driven Development of Educational Materials: The Edukalibre Approach
Abstract. The libre software development model has shown how combining collective intelligence can lead to revolutionary methods that underpin major software advancements. This pap...
Jesús M. González-Barahona, Vania Di...
XPU
2010
Springer
13 years 5 months ago
Towards Understanding Communication Structure in Pair Programming
Pair Programming has often been reported to be beneficial in software projects. To better understand where these benefits come from we evaluate the aspect of intra-pair communica...
Kai Stapel, Eric Knauss, Kurt Schneider, Matthias ...
BPSC
2009
190views Business» more  BPSC 2009»
13 years 8 months ago
Detective Information Flow Analysis for Business Processes
Abstract: We report on ongoing work towards a posteriori detection of illegal information flows for business processes, focusing on the challenges involved in doing so. Resembling ...
Rafael Accorsi, Claus Wonnemann