Sciweavers

1654 search results - page 222 / 331
» Comparing Two Software Design Process Theories
Sort
View
HICSS
2007
IEEE
118views Biometrics» more  HICSS 2007»
15 years 11 months ago
Is the Open Way a Better Way? Digital Forensics Using Open Source Tools
The subject of digital forensics can be quite challenging. Digital forensics is in its infancy and teaching digital forensics includes the techniques as well as the tools that ass...
Dan Manson, Anna Carlin, Steve Ramos, Alain Gyger,...
EUROSYS
2008
ACM
16 years 1 months ago
Application-level isolation and recovery with solitude
When computer systems are compromised by an attack, it is difficult to determine the precise extent of the damage caused by the attack because the state changes made by an attack...
Shvetank Jain, Fareha Shafique, Vladan Djeric, Ash...
ICPR
2006
IEEE
16 years 5 months ago
A Prototypes-Embedded Genetic K-means Algorithm
This paper presents a genetic algorithm (GA) for Kmeans clustering. Instead of the widely applied stringof-group-numbers encoding, we encode the prototypes of the clusters into th...
Hsin-Chia Fu, Hsin-Min Wang, Shih-Sian Cheng, Yi-H...
VLSID
2009
IEEE
220views VLSI» more  VLSID 2009»
16 years 5 months ago
A 7T/14T Dependable SRAM and its Array Structure to Avoid Half Selection
We propose a novel dependable SRAM with 7T cells and their array structure that avoids a half-selection problem. In addition, we introduce a new concept, "quality of a bit (Q...
Hidehiro Fujiwara, Shunsuke Okumura, Yusuke Iguchi...
ICPR
2010
IEEE
15 years 11 months ago
Forward-Backward Consistent Trajectories in Video Sequences
This paper is concerned with accuracy estimation of point trajectories in video sequences without ground truth information. This is an essential problem for many computer vision a...
Zdenek Kalal, Krystian Mikolajczyk, Jiri Matas