Sciweavers

5550 search results - page 1086 / 1110
» Different Approaches to Proof Systems
Sort
View
ISPAN
2005
IEEE
15 years 3 months ago
Process Scheduling for the Parallel Desktop
Commodity hardware and software are growing increasingly more complex, with advances such as chip heterogeneity and specialization, deeper memory hierarchies, ne-grained power ma...
Eitan Frachtenberg
SIGSOFT
2005
ACM
15 years 3 months ago
Detecting higher-level similarity patterns in programs
Cloning in software systems is known to create problems during software maintenance. Several techniques have been proposed to detect the same or similar code fragments in software...
Hamid Abdul Basit, Stan Jarzabek
SOUPS
2005
ACM
15 years 3 months ago
Two experiences designing for effective security
In our research, we have been concerned with the question of how to make relevant features of security situations visible to users in order to allow them to make informed decision...
Rogério de Paula, Xianghua Ding, Paul Douri...
GFKL
2005
Springer
117views Data Mining» more  GFKL 2005»
15 years 3 months ago
A Cross-cultural Evaluation Framework for Behavioral Biometric User Authentication
Today biometric techniques are based either on passive (e.g. IrisScan, Face) or active methods (e.g. voice and handwriting). In our work we focus on evaluation of the latter. These...
Franziska Wolf, T. K. Basu, Pranab K. Dutta, Claus...
UML
2005
Springer
15 years 3 months ago
Use Cases in Model-Driven Software Engineering
Use cases have achieved wide use as specification tools for systems observable behavior, but there still remains a large gap between specifying behavior and determining the softwar...
Hernán Astudillo, Gonzalo Génova, Mi...
« Prev « First page 1086 / 1110 Last » Next »