Sciweavers

1690 search results - page 208 / 338
» Algorithmic Properties of Millstream Systems
Sort
View
KBSE
2005
IEEE
15 years 10 months ago
Secure sharing between untrusted users in a transparent source/binary deployment model
The Nix software deployment system is based on the paradigm of transparent source/binary deployment: distributors deploy descriptors that build components from source, while clien...
Eelco Dolstra
TSE
1998
129views more  TSE 1998»
15 years 4 months ago
Inferring Declarative Requirements Specifications from Operational Scenarios
—Scenarios are increasingly recognized as an effective means for eliciting, validating, and documenting software requirements. This paper concentrates on the use of scenarios for...
Axel van Lamsweerde, Laurent Willemet

Publication
1169views
16 years 10 months ago
Image Enhancement for Backlight-Scaled TFT-LCD Displays
One common way to extend the battery life of a portable device is to reduce the LCD backlight intensity. In contrast to previous approaches that minimize the power consumption by a...
Pei-Shan Tsai, Chia-Kai Liang, Tai-Hsiang Huang, a...
ECCV
2008
Springer
16 years 7 months ago
Passive Reflectometry
Different materials reflect light in different ways, so reflectance is a useful surface descriptor. Existing systems for measuring reflectance are cumbersome, however, and although...
Fabiano Romeiro, Yuriy Vasilyev, Todd Zickler
WWW
2004
ACM
16 years 5 months ago
A hybrid approach for searching in the semantic web
This paper presents a search architecture that combines classical search techniques with spread activation techniques applied to a semantic model of a given domain. Given an ontol...
Cristiano Rocha, Daniel Schwabe, Marcus Poggi de A...