Sciweavers

7961 search results - page 1373 / 1593
» Input-Output Model Programs
Sort
View
ICSE
2008
IEEE-ACM
16 years 3 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
ICSE
2008
IEEE-ACM
16 years 3 months ago
An ontology-driven software architecture evaluation method
Software architecture evaluation has a crucial role in the life cycle of software intensive systems. In this paper we propose an approach to empower a software architecture evalua...
Aida Erfanian, Fereidoun Shams Aliee
CVPR
2008
IEEE
16 years 3 months ago
Real-Time Face Pose Estimation from Single Range Images
We present a real-time algorithm to estimate the 3D pose of a previously unseen face from a single range im- age. Based on a novel shape signature to identify noses in range ima...
Michael D. Breitenstein, Daniel Küttel, Thiba...
127
Voted
PERCOM
2005
ACM
16 years 3 months ago
Mobile data collection in sensor networks: The TinyLime
In this paper we describe TinyLime, a novel middleware for wireless sensor networks that departs from the traditional setting where sensor data is collected by a central monitorin...
Carlo Curino, Matteo Giani, Marco Giorgetta, Aless...
170
Voted
MOBISYS
2006
ACM
16 years 3 months ago
Pegboard: a framework for developing mobile applications
Tool support for mobile application development can significantly improve programmer productivity and software quality. Pegboard is a novel tooling framework that extends the Ecli...
Danny Soroker, Ramón Cáceres, Danny ...
« Prev « First page 1373 / 1593 Last » Next »