Sciweavers

341 search results - page 58 / 69
» A Security Engineering Process based on Patterns
Sort
View
IJOSSP
2010
128views more  IJOSSP 2010»
14 years 6 months ago
Repositories with Public Data about Software Development
Empirical research on software development based on data obtained from project repositories and code forges is increasingly gaining attention in the software engineering research ...
Jesús M. González-Barahona, Daniel I...
CIVR
2010
Springer
276views Image Analysis» more  CIVR 2010»
15 years 4 months ago
Optimizing visual search with implicit user feedback in interactive video retrieval
This paper describes an approach to optimize query by visual example results, by combining visual features and implicit user feedback in interactive video retrieval. To this end, ...
Stefanos Vrochidis, Ioannis Kompatsiaris, Ioannis ...
WSE
2002
IEEE
15 years 4 months ago
Laying the Foundation for Web Services over Legacy Systems
As the use of the World Wide Web becomes more pervasive within our society, businesses and institutions are required to migrate a wide range of services to the web. Difficulties a...
Janet Lavery, Cornelia Boldyreff, Bin Ling, Colin ...
IUI
2010
ACM
15 years 6 months ago
Intelligent understanding of handwritten geometry theorem proving
Computer-based geometry systems have been widely used for teaching and learning, but largely based on mouse-andkeyboard interaction, these systems usually require users to draw fi...
Yingying Jiang, Feng Tian, Hongan Wang, Xiaolong Z...
STOC
2005
ACM
164views Algorithms» more  STOC 2005»
15 years 12 months ago
Cooperative asynchronous update of shared memory
The Write-All problem for an asynchronous shared-memory system has the objective for the processes to update the contents of a set of shared registers, while minimizing the mber o...
Bogdan S. Chlebus, Dariusz R. Kowalski