Sciweavers

674 search results - page 120 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
CASES
2008
ACM
13 years 11 months ago
Multi-granularity sampling for simulating concurrent heterogeneous applications
Detailed or cycle-accurate/bit-accurate (CABA) simulation is a critical phase in the design flow of embedded systems. However, with increasing system complexity, full detailed sim...
Melhem Tawk, Khaled Z. Ibrahim, Smaïl Niar
ICCV
2005
IEEE
14 years 11 months ago
Structured Light in Scattering Media
Virtually all structured light methods assume that the scene and the sources are immersed in pure air and that light is neither scattered nor absorbed. Recently, however, structur...
Srinivasa G. Narasimhan, Shree K. Nayar, Bo Sun, S...
KDD
2007
ACM
152views Data Mining» more  KDD 2007»
14 years 9 months ago
A framework for classification and segmentation of massive audio data streams
In recent years, the proliferation of VOIP data has created a number of applications in which it is desirable to perform quick online classification and recognition of massive voi...
Charu C. Aggarwal
ICIP
2002
IEEE
14 years 10 months ago
Optimal recursive similarity measure estimation for interactive content-based image retrieval
In this paper, a new recursive algorithm is proposed for optimal estimation of similarity measure used in a content-based retrieval system. This is performed through a relevance f...
Anastasios D. Doulamis, Nikolaos D. Doulamis
ACMDIS
2000
ACM
14 years 1 months ago
Rapid Ethnography: Time Deepening Strategies for HCI Field Research
Field research methods are useful in the many aspects of HumanComputer Interaction research, including gathering user requirements, understanding and developing user models, and n...
David R. Millen