Sciweavers

4359 search results - page 854 / 872
» Automated Pipeline Design
Sort
View
ICSE
2001
IEEE-ACM
15 years 2 months ago
The Coming-of-Age of Software Architecture Research
Over the past decade, software architecture research has emerged as the principled study of the overall structure of software systems, especially the relations among subsystems an...
Mary M. Shaw
SIGUCCS
2000
ACM
15 years 2 months ago
Knowledgebase Integration with a 24-hour Help Desk
The University of Pittsburgh's Computing Services and Systems Development organization is focused on the needs of the faculty and student population, totaling nearly 40,000 u...
Jay Graham, Brian K. Hart
ICPR
2010
IEEE
15 years 2 months ago
Detecting Altered Fingerprints
Abstract--The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring t...
Jianjiang Feng, Anil Jain, Arun Ross
CRYPTO
2000
Springer
134views Cryptology» more  CRYPTO 2000»
15 years 2 months ago
Taming the Adversary
Abstract. While there is a great deal of sophistication in modern cryptology, simple (and simplistic) explanations of cryptography remain useful and perhaps necessary. Many of the ...
Martín Abadi
70
Voted
HICSS
2010
IEEE
166views Biometrics» more  HICSS 2010»
15 years 2 months ago
VrtProf: Vertical Profiling for System Virtualization
As data centers and end users become increasingly reliant on virtualization technology, more efficient and accurate methods of profiling such systems are needed. However, under vir...
Hussam Mousa, Kshitij Doshi, Timothy Sherwood, ElM...