Sciweavers

ACSC
2004
IEEE
13 years 7 months ago
An Approach to Specifying Software Frameworks
A framework is a reusable design that requires software components to function. To instantiate a framework, a software engineer must provide the software components required by th...
Leesa Murray, David A. Carrington, Paul A. Stroope...
ACSC
2004
IEEE
13 years 7 months ago
An Open Meteorological Alerting System: Issues and Solutions
This paper describes an experimental alerting system under development by the Australian Bureau of Meteorology, initially targetted at (but not restricted to) the aviation sector....
Ian D. Mathieson, Sandy Dance, Lin Padgham, Malcol...
ACSC
2004
IEEE
13 years 7 months ago
Access-Ordered Indexes
Search engines are an essential tool for modern life. We use them to discover new information on diverse topics and to locate a wide range of resources. The search process in all ...
Steven Garcia, Hugh E. Williams, Adam Cannane
ACSC
2004
IEEE
13 years 7 months ago
Detecting Privacy and Ethical Sensitivity in Data Mining Results
Knowledge discovery allows considerable insight into data. This brings with it the inherent risk that what is inferred may be private or ethically sensitive. The process of genera...
Peter Fule, John F. Roddick
ACSC
2004
IEEE
13 years 7 months ago
A RMI Protocol for Aglets
Aglets is a mobile agent system that allows an agent to move with its code and execution state across the network to interact with other entities. Aglets utilizes Java RMI to supp...
Feng Lu, Kris Bubendorfer
ACSC
2004
IEEE
13 years 7 months ago
Towards the Completion of the Formal Semantics of OCL 2.0
The Object Constraint Language (OCL) is part of the Unified Modeling Language (UML) to specify restrictions on values of a given UML model. As part of the UML 2.0 standardization ...
Stephan Flake
ACSC
2004
IEEE
13 years 7 months ago
Visually Sealed and Digitally Signed Documents
One of the primary flaws with current digital signature technology is that a digital signature does not "feel" or resemble a traditional seal or personal signature to th...
Vicky Liu, William J. Caelli, Ernest Foo, Selwyn R...
ACSC
2004
IEEE
13 years 7 months ago
On Improving the Memory Access Patterns During The Execution of Strassen's Matrix Multiplication Algorithm
Matrix multiplication is a basic computing operation. Whereas it is basic, it is also very expensive with a straight forward technique of O(N3 ) runtime complexity. More complex s...
Hossam A. ElGindy, George Ferizis
ACSC
2004
IEEE
13 years 7 months ago
Sensor Fusion Weighting Measures in Audio-Visual Speech Recognition
Audio-Visual Speech Recognition (AVSR) uses vision to enhance speech recognition but also introduces the problem of how to join (or fuse) these two signals together. Mainstream re...
Trent W. Lewis, David M. W. Powers
ACSC
2004
IEEE
13 years 7 months ago
Network Robustness and Graph Topology
Two important recent trends in military and civilian communications have been the increasing tendency to base operations around an internal network, and the increasing threats to ...
Anthony H. Dekker, Bernard D. Colbert