Sciweavers

2421 search results - page 170 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
111
Voted
CVPR
2010
IEEE
15 years 11 months ago
A Square-Root Sampling Approach to Fast Histogram-Based Search
We present an efficient pixel-sampling technique for histogram-based search. Given a template image as a query, a typical histogram-based algorithm aims to find the location of ...
Huang-Wei Chang, Hwann-Tzong Chen
131
Voted
KBSE
2005
IEEE
15 years 9 months ago
A threat-driven approach to modeling and verifying secure software
This paper presents a formal approach to threat-driven modeling and verification of secure software using aspect-oriented Petri nets. Based on the behavior model of intended funct...
Dianxiang Xu, Kendall E. Nygard
HIPC
2003
Springer
15 years 8 months ago
Double-Loop Feedback-Based Scheduling Approach for Distributed Real-Time Systems
The use of feedback control techniques has been gaining importance in real-time scheduling as a means to provide predictable performance in the face of uncertain workload. In this ...
Suzhen Lin, G. Manimaran
116
Voted
UIST
1995
ACM
15 years 7 months ago
Multiple-View Approach for Smooth Information Retrieval
Although various visualization techniques have been proposed for information retrieval tasks, most of them are based on a single strategy for viewing and navigating through the in...
Toshiyuki Masui, Mitsuru Minakuchi, George R. Bord...
116
Voted
RTS
2006
96views more  RTS 2006»
15 years 3 months ago
The TTA's Approach to Resilience after Transient Upsets
Abstract. The Time-Triggered Architecture, as architecture for safety-critical realtime applications, incorporates fault-tolerance mechanisms to ensure correct system operation des...
Wilfried Steiner, Michael Paulitsch, Hermann Kopet...