Sciweavers

127 search results - page 24 / 26
» Contract-Based Approach to Analyze Software Components
Sort
View
EUROSYS
2010
ACM
15 years 2 months ago
Residue objects: a challenge to web browser security
A complex software system typically has a large number of objects in the memory, holding references to each other to implement an object model. Deciding when the objects should be...
Shuo Chen, Hong Chen, Manuel Caballero
DBSEC
2004
170views Database» more  DBSEC 2004»
14 years 11 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...
MMS
2008
14 years 9 months ago
Canonical processes for creating personalized semantically rich multimedia presentations
Authoring of multimedia content can be considered as composing media assets such as images, videos, text, and audio in time, space, and interaction into a coherent multimedia pres...
Ansgar Scherp
TASLP
2010
134views more  TASLP 2010»
14 years 4 months ago
Multiple Fundamental Frequency Estimation by Modeling Spectral Peaks and Non-Peak Regions
This paper presents a maximum likelihood approach to multiple fundamental frequency (F0) estimation for a mixture of harmonic sound sources, where the power spectrum of a time fra...
Zhiyao Duan, Bryan Pardo, Changshui Zhang
86
Voted
BMCBI
2005
145views more  BMCBI 2005»
14 years 9 months ago
CAGER: classification analysis of gene expression regulation using multiple information sources
Background: Many classification approaches have been applied to analyzing transcriptional regulation of gene expressions. These methods build models that can explain a gene's...
Jianhua Ruan, Weixiong Zhang