Sciweavers

406 search results - page 56 / 82
» Identifying Codes and Covering Problems
Sort
View
ICFP
2009
ACM
16 years 4 months ago
A theory of typed coercions and its applications
A number of important program rewriting scenarios can be recast as type-directed coercion insertion. These range from more theoretical applications such as coercive subtyping and ...
Nikhil Swamy, Michael W. Hicks, Gavin M. Bierman
ICIP
2008
IEEE
15 years 10 months ago
H.264/AVC video scrambling for privacy protection
In this paper, we address the problem of privacy in video surveillance systems. More specifically, we consider the case of H.264/AVC which is the state-of-the-art in video coding....
Frédéric Dufaux, Touradj Ebrahimi
IWPC
2007
IEEE
15 years 10 months ago
Tracking Objects to Detect Feature Dependencies
The domain-specific ontology of a software system includes a set of features and their relationships. While the problem of locating features in object-oriented programs has been ...
Adrian Lienhard, Orla Greevy, Oscar Nierstrasz
ASPDAC
2006
ACM
109views Hardware» more  ASPDAC 2006»
15 years 9 months ago
Energy savings through embedded processing on disk system
Abstract— Many of today’s data-intensive applications manipulate disk-resident data sets. As a result, their overall behavior is tightly coupled with their disk performance. Un...
Seung Woo Son, Guangyu Chen, Mahmut T. Kandemir, F...
HICSS
2003
IEEE
153views Biometrics» more  HICSS 2003»
15 years 9 months ago
Automatic Mediation between Incompatible Component Interaction Styles
Incompatibility of component interaction styles is identified as a major obstacle to interoperability when using off-the-shelf components or dealing with legacy software in compos...
Klaus-Peter Löhr