Sciweavers

371 search results - page 57 / 75
» Comparing models for identifying fault-prone software compon...
Sort
View
ECIS
2004
15 years 1 months ago
Security and privacy in a structured information network
The lack of trust amongst consumers and concerns about disclosing personal information are commonly seen as a major impediment to the growth of e-commerce. This is a consequence o...
Tuomas Valtonen, Tero Reuna, Kalle Luhtinen
ESORICS
2010
Springer
15 years 26 days ago
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previo...
Daniele Perito, Gene Tsudik
IUI
2009
ACM
15 years 8 months ago
Data-driven exploration of musical chord sequences
We present data-driven methods for supporting musical creativity by capturing the statistics of a musical database. Specifically, we introduce a system that supports users in expl...
Eric Nichols, Dan Morris, Sumit Basu
HIPEAC
2009
Springer
15 years 6 months ago
Predictive Runtime Code Scheduling for Heterogeneous Architectures
Heterogeneous architectures are currently widespread. With the advent of easy-to-program general purpose GPUs, virtually every recent desktop computer is a heterogeneous system. Co...
Víctor J. Jiménez, Lluís Vila...
95
Voted
ICSEA
2009
IEEE
15 years 6 months ago
Testing of Image Processing Algorithms on Synthetic Data
—In this paper, it is shown that synthetic images can be used to test specific use cases of a lane tracking algorithm which has been developed by Audi AG. This was achieved by s...
Kilian von Neumann-Cosel, Erwin Roth, Daniel Lehma...