Sciweavers

2740 search results - page 318 / 548
» A Model-Based Approach To Requirements Analysis
Sort
View
117
Voted
IEAAIE
2010
Springer
15 years 1 months ago
Learning User Preferences to Maximise Occupant Comfort in Office Buildings
It is desirable to ensure that the thermal comfort conditions in offices are in line with the preferences of occupants. Controlling their offices correctly therefore requires the c...
Anika Schumann, Nic Wilson, Mateo Burillo
131
Voted
TC
2010
14 years 10 months ago
Performance Comparison of Graphics Processors to Reconfigurable Logic: A Case Study
A systematic approach to the comparison of the graphics processor (GPU) and reconfigurable logic is defined in terms of three throughput drivers. The approach is applied to five ca...
Ben Cope, Peter Y. K. Cheung, Wayne Luk, Lee W. Ho...
152
Voted
ICIP
2008
IEEE
16 years 5 months ago
Significant jet point for facial image representation and recognition
Gabor wavelet related feature extraction and classification is an important topic in image analysis and pattern recognition. Gabor features can be used either holistically or anal...
Sanqiang Zhao, Yongsheng Gao
119
Voted
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
15 years 10 months ago
Practical Proactive Integrity Preservation: A Basis for Malware Defense
Unlike today’s reactive approaches, information flow based approaches can provide positive assurances about overall system integrity, and hence can defend against sophisticated...
Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karan...
COLCOM
2007
IEEE
15 years 10 months ago
Unraveling decentralized authorization for multi-domain collaborations
Abstract—Current authorization solutions take highly case-bycase approaches. First of all, the solutions address particular types of multi-domain collaborations such as Virtual O...
Hannah K. Lee