Sciweavers

2015 search results - page 207 / 403
» Hidden Software Capabilities
Sort
View
145
Voted
WISTP
2010
Springer
15 years 10 months ago
A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones
Widespread use and general purpose computing capabilities of next generation smartphones make them the next big targets of malicious software (malware) and security attacks. Given ...
Tansu Alpcan, Christian Bauckhage, Aubrey-Derrick ...
CBMS
2009
IEEE
15 years 10 months ago
HL7 healthcare information management using aspect-oriented programming
Given the heterogeneity of healthcare software systems, data from each system is often incompatible inhibiting interoperability. To enable the sharing and exchange of healthcare i...
Jennifer Munnelly, Siobhán Clarke
PDP
2009
IEEE
15 years 10 months ago
Phoenix: A Runtime Environment for High Performance Computing on Chip Multiprocessors
Abstract—Execution of applications on upcoming highperformance computing (HPC) systems introduces a variety of new challenges and amplifies many existing ones. These systems will...
Avneesh Pant, Hassan Jafri, Volodymyr V. Kindraten...
FMCAD
2009
Springer
15 years 10 months ago
Scalable conditional equivalence checking: An automated invariant-generation based approach
—Sequential equivalence checking (SEC) technologies, capable of demonstrating the behavioral equivalence of two designs, have grown dramatically in capacity over the past decades...
Jason Baumgartner, Hari Mony, Michael L. Case, Jun...
120
Voted
VRST
2009
ACM
15 years 10 months ago
Wearable imaging system for capturing omnidirectional movies from a first-person perspective
We propose a novel wearable imaging system that can capture omnidirectional movies from the viewpoint of the camera wearer. The imaging system solves the problems of resolution un...
Kazuaki Kondo, Yasuhiro Mukaigawa, Yasushi Yagi