Sciweavers

24741 search results - page 4911 / 4949
» Virtual Network Computing
Sort
View
ACNS
2006
Springer
87views Cryptology» more  ACNS 2006»
15 years 6 months ago
Effect of Malicious Synchronization
Abstract. We study the impact of malicious synchronization on computer systems that serve customers periodically. Systems supporting automatic periodic updates are common in web se...
Mun Choon Chan, Ee-Chien Chang, Liming Lu, Peng So...
AC
2003
Springer
15 years 5 months ago
Influence of Location over Several Classifiers in 2D and 3D Face Verification
In this paper two methods for human face recognition and the influence of location mistakes are shown. First one, Principal Components Analysis (PCA), has been one of the most appl...
Susana Mata, Cristina Conde, Araceli Sánche...
BIBE
2001
IEEE
179views Bioinformatics» more  BIBE 2001»
15 years 5 months ago
Texture-Based 3-D Brain Imaging
Different modalities in biomedical imaging, like CT, MRI and PET scanners, provide detailed crosssectional views of the human anatomy. The imagery obtained from these scanning dev...
Sagar Saladi, Pujita Pinnamaneni, Joerg Meyer
ICSE
2000
IEEE-ACM
15 years 5 months ago
Software engineering and performance: a road-map
Software engineering has traditionally focussed on functional requirements and how to build software that has few bugs and can be easily maintained. Most design approaches include...
Rob Pooley
RTCSA
1995
IEEE
15 years 5 months ago
A timeliness-guaranteed kernel model-DREAM kernel-and implementation techniques
: An essential building-block for construction of future real-time computer systems (RTCS’s) is a timeliness-guaranteed operating system. The first co-author recently formulated ...
K. H. (Kane) Kim, Luiz F. Bacellar, Yuseok Kim, Ch...
« Prev « First page 4911 / 4949 Last » Next »