Sciweavers

24188 search results - page 4796 / 4838
» Computing on Encrypted Data
Sort
View
CVIU
2007
154views more  CVIU 2007»
14 years 10 months ago
Smart particle filtering for high-dimensional tracking
Tracking articulated structures like a hand or body within a reasonable time is challenging because of the high dimensionality of the state space. Recently, a new optimization met...
Matthieu Bray, Esther Koller-Meier, Luc J. Van Goo...
JSA
2008
108views more  JSA 2008»
14 years 10 months ago
A methodology to design arbitrary failure detectors for distributed protocols
Nowadays, there are many protocols able to cope with process crashes, but, unfortunately, a process crash represents only a particular faulty behavior. Handling tougher failures (...
Roberto Baldoni, Jean-Michel Hélary, Sara T...
JUCS
2008
115views more  JUCS 2008»
14 years 10 months ago
Capturing Interaction Requirements in a Model Transformation Technology Based on MDA
: Currently, many models are used to capture functional software requirements. However, the Software Engineering community has faded interaction requirements into the background, d...
José Ignacio Panach, Sergio España, ...
DPD
2007
86views more  DPD 2007»
14 years 10 months ago
Semantics based customization of UBL document schemas
Abstract. Universal Business Language (UBL) is an OASIS initiative to develop common business document schemas to provide document interoperability in the eBusiness domain. Since t...
Yalin Yarimagan, Asuman Dogac
ENTCS
2007
113views more  ENTCS 2007»
14 years 10 months ago
Modular Checkpointing for Atomicity
Transient faults that arise in large-scale software systems can often be repaired by re-executing the code in which they occur. Ascribing a meaningful semantics for safe re-execut...
Lukasz Ziarek, Philip Schatz, Suresh Jagannathan
« Prev « First page 4796 / 4838 Last » Next »