Sciweavers

1548 search results - page 265 / 310
» Estimating Software Vulnerabilities
Sort
View
IPPS
2007
IEEE
15 years 5 months ago
A Key-based Adaptive Transactional Memory Executor
Software transactional memory systems enable a programmer to easily write concurrent data structures such as lists, trees, hashtables, and graphs, where non-conflicting operation...
Tongxin Bai, Xipeng Shen, Chengliang Zhang, Willia...
ISORC
2007
IEEE
15 years 5 months ago
QoS Management of Real-Time Data Stream Queries in Distributed Environments
Many emerging applications operate on continuous unbounded data streams and need real-time data services. Providing deadline guarantees for queries over dynamic data streams is a ...
Yuan Wei, Vibha Prasad, Sang Hyuk Son
ACCV
2007
Springer
15 years 5 months ago
Fast Optimal Three View Triangulation
We consider the problem of L2-optimal triangulation from three separate views. Triangulation is an important part of numerous computer vision systems. Under gaussian noise, minimiz...
Martin Byröd, Klas Josephson, Kalle Åst...
CAISE
2007
Springer
15 years 5 months ago
Analyzing the Dynamic Cost Factors of Process-Aware Information Systems: A Model-Based Approach
Introducing process-aware information systems (PAIS) in enterprises is usually associated with high costs. It is therefore crucial to understand those factors that determine these ...
Bela Mutschler, Manfred Reichert, Stefanie Rinderl...
CBMS
2006
IEEE
15 years 5 months ago
A Preliminary Study of Respiratory Variations in the Photoplethysmogram during Lower Body Negative Pressure
Previous studies have shown that the photoplethysmogram (PPG) may be a useful tool for the noninvasive detection of hypovolemia. The focus has been on determining if frequency ana...
Suzanne Wendelken, Stephen Paul Linder, Sue McGrat...