Sciweavers

5241 search results - page 772 / 1049
» Embedded Programming with C
Sort
View
122
Voted
ASM
2010
ASM
16 years 21 days ago
Lightweight Modeling of Java Virtual Machine Security Constraints
The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly i...
Mark C. Reynolds
128
Voted
CVPR
2010
IEEE
16 years 21 hour ago
Estimation of Image Bias Field with Sparsity Constraints
We propose a new scheme to estimate image bias field through introducing two sparsity constraints. One is that the bias-free image has concise representation with image gradients o...
Yuanjie Zheng and James C. Gee
111
Voted
ECBS
2009
IEEE
105views Hardware» more  ECBS 2009»
15 years 10 months ago
A Framework for Developing Feature-Rich Software Systems
In response to changing requirements and other environmental influences, software systems are increasingly developed incrementally. Successful implementation of new features in e...
Thein Than Tun, Rod Chapman, Charles B. Haley, Rob...
119
Voted
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
15 years 10 months ago
Computational Evaluation of Software Security Attributes
In the current state of practice, security properties of software systems are typically assessed through subjective, labor-intensive human evaluation. Moreover, much of the quanti...
Gwendolyn H. Walton, Thomas A. Longstaff, Richard ...
124
Voted
CLUSTER
2009
IEEE
15 years 10 months ago
GPU clusters for high-performance computing
—Large-scale GPU clusters are gaining popularity in the scientific computing community. However, their deployment and production use are associated with a number of new challenge...
Volodymyr V. Kindratenko, Jeremy Enos, Guochun Shi...