Sciweavers

2597 search results - page 426 / 520
» A Relational Approach to Support Software Architecture Analy...
Sort
View
BPM
2008
Springer
164views Business» more  BPM 2008»
15 years 7 months ago
Analyzing Business Continuity through a Multi-layers Model
Business Continuity Management (BCM) is a process to manage risks, emergencies, and recovery plans of an organization during a crisis. It results in a document called Business Cont...
Yudistira Asnar, Paolo Giorgini
DOCENG
2008
ACM
15 years 7 months ago
Satisficing scrolls: a shortcut to satisfactory layout
We present at a new approach to finding aesthetically pleasing page layouts. We do not aim to find an optimal layout, rather the aim is to find a layout which is not obviously wro...
Nathan Hurst, Kim Marriott
CAIP
2011
Springer
248views Image Analysis» more  CAIP 2011»
14 years 5 months ago
Statistical Tuning of Adaptive-Weight Depth Map Algorithm
Abstract. In depth map generation, the settings of the algorithm parameters to yield an accurate disparity estimation are usually chosen empirically or based on unplanned experimen...
Alejandro Hoyos, John Congote, Iñigo Barand...
ISVLSI
2006
IEEE
114views VLSI» more  ISVLSI 2006»
15 years 11 months ago
A Low Power Lookup Technique for Multi-Hashing Network Applications
Many network security applications require large virus signature sets to be maintained, retrieved, and compared against the network streams. Software applications frequently fail ...
Ilhan Kaya, Taskin Koçak
175
Voted
HPCA
2005
IEEE
16 years 5 months ago
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Datab...
Feng Qin, Shan Lu, Yuanyuan Zhou