Sciweavers

24741 search results - page 4911 / 4949
» Virtual Network Computing
Sort
View
ACNS
2006
Springer
87views Cryptology» more  ACNS 2006»
14 years 22 days ago
Effect of Malicious Synchronization
Abstract. We study the impact of malicious synchronization on computer systems that serve customers periodically. Systems supporting automatic periodic updates are common in web se...
Mun Choon Chan, Ee-Chien Chang, Liming Lu, Peng So...
AC
2003
Springer
14 years 21 days ago
Influence of Location over Several Classifiers in 2D and 3D Face Verification
In this paper two methods for human face recognition and the influence of location mistakes are shown. First one, Principal Components Analysis (PCA), has been one of the most appl...
Susana Mata, Cristina Conde, Araceli Sánche...
BIBE
2001
IEEE
179views Bioinformatics» more  BIBE 2001»
14 years 21 days ago
Texture-Based 3-D Brain Imaging
Different modalities in biomedical imaging, like CT, MRI and PET scanners, provide detailed crosssectional views of the human anatomy. The imagery obtained from these scanning dev...
Sagar Saladi, Pujita Pinnamaneni, Joerg Meyer
ICSE
2000
IEEE-ACM
14 years 19 days ago
Software engineering and performance: a road-map
Software engineering has traditionally focussed on functional requirements and how to build software that has few bugs and can be easily maintained. Most design approaches include...
Rob Pooley
RTCSA
1995
IEEE
14 years 17 days ago
A timeliness-guaranteed kernel model-DREAM kernel-and implementation techniques
: An essential building-block for construction of future real-time computer systems (RTCS’s) is a timeliness-guaranteed operating system. The first co-author recently formulated ...
K. H. (Kane) Kim, Luiz F. Bacellar, Yuseok Kim, Ch...
« Prev « First page 4911 / 4949 Last » Next »