Sciweavers

3898 search results - page 390 / 780
» Maintaining Component-Based Systems
Sort
View
SCAM
2008
IEEE
15 years 11 months ago
The Evolution and Decay of Statically Detected Source Code Vulnerabilities
The presence of vulnerable statements in the source code is a crucial problem for maintainers: properly monitoring and, if necessary, removing them is highly desirable to ensure h...
Massimiliano Di Penta, Luigi Cerulo, Lerina Aversa...
AIMS
2008
Springer
15 years 11 months ago
A Theory of Closure Operators
We explore how fixed-point operators can be designed to interact and be composed to form autonomic control mechanisms. We depart from the idea that an operator is idempotent only ...
Alva L. Couch, Marc Chiarini
147
Voted
CRV
2007
IEEE
224views Robotics» more  CRV 2007»
15 years 11 months ago
Real-time eye blink detection with GPU-based SIFT tracking
This paper reports on the implementation of a GPUbased, real-time eye blink detector on very low contrast images acquired under near-infrared illumination. This detector is part o...
Marc Lalonde, David Byrns, Langis Gagnon, Normand ...
GLOBECOM
2007
IEEE
15 years 11 months ago
Process for QoS-Aware IP Network Planning Using Accounting Data and Effective Bandwidth Estimation
- In this paper we describe QoSPlan – a generalized process for preparing information relevant to QoS-aware IP network planning. QoSPlan is designed to reduce the cost of deploym...
Alan Davy, Dmitri Botvich, Brendan Jennings
ICC
2007
IEEE
116views Communications» more  ICC 2007»
15 years 11 months ago
Skip Tree Graph: a Distributed and Balanced Search Tree for Peer-to-Peer Networks
Abstract—Skip Tree Graph is a novel, distributed, data structure for peer-to-peer systems that supports exact-match and order-based queries such as range queries efficiently. It...
Alejandra González Beltrán, Paul Sag...