Sciweavers

14244 search results - page 2644 / 2849
» Modeling Program Predictability
Sort
View
ICSE
2008
IEEE-ACM
16 years 2 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
ICSE
2008
IEEE-ACM
16 years 2 months ago
An ontology-driven software architecture evaluation method
Software architecture evaluation has a crucial role in the life cycle of software intensive systems. In this paper we propose an approach to empower a software architecture evalua...
Aida Erfanian, Fereidoun Shams Aliee
CVPR
2008
IEEE
16 years 2 months ago
Real-Time Face Pose Estimation from Single Range Images
We present a real-time algorithm to estimate the 3D pose of a previously unseen face from a single range im- age. Based on a novel shape signature to identify noses in range ima...
Michael D. Breitenstein, Daniel Küttel, Thiba...
PERCOM
2005
ACM
16 years 1 months ago
Mobile data collection in sensor networks: The TinyLime
In this paper we describe TinyLime, a novel middleware for wireless sensor networks that departs from the traditional setting where sensor data is collected by a central monitorin...
Carlo Curino, Matteo Giani, Marco Giorgetta, Aless...
MOBISYS
2006
ACM
16 years 1 months ago
Pegboard: a framework for developing mobile applications
Tool support for mobile application development can significantly improve programmer productivity and software quality. Pegboard is a novel tooling framework that extends the Ecli...
Danny Soroker, Ramón Cáceres, Danny ...
« Prev « First page 2644 / 2849 Last » Next »