Sciweavers

423 search results - page 49 / 85
» ideal 2007
Sort
View
ACSAC
2007
IEEE
14 years 3 months ago
An Overview of the Annex System
This paper describes the security and network architecture of the Annex system, a family of technologies for secure and pervasive communication and information processing that we ...
Duncan A. Grove, Toby C. Murray, C. A. Owen, Chris...
AGILEDC
2007
IEEE
14 years 3 months ago
Agile Development Iterations and UI Design
Many agile projects require user interaction (UI) design, but the integration of UI design into agile development is not well understood. This is because both agile development an...
Jennifer Ferreira, James Noble, Robert Biddle
BLISS
2007
IEEE
14 years 3 months ago
Evolving the Face of a Criminal: How to Search a Face Space More Effectively
Witnesses and victims of serious crime are often required to construct a facial composite, a visual likeness of a suspect’s face. The traditional method is for them to select in...
Charlie D. Frowd, Vicki Bruce, Carol Gannon, Mark ...
BROADNETS
2007
IEEE
14 years 3 months ago
Modeling and generating TCP application workloads
Abstract — In order to perform valid experiments, traffic generators used in network simulators and testbeds require up to date models of traffic as it exists on real network lin...
Félix Hernández-Campos, Kevin Jeffay...
CGO
2007
IEEE
14 years 3 months ago
Exploiting Narrow Accelerators with Data-Centric Subgraph Mapping
The demand for high performance has driven acyclic computation accelerators into extensive use in modern embedded and desktop architectures. Accelerators that are ideal from a sof...
Amir Hormati, Nathan Clark, Scott A. Mahlke