Sciweavers

842 search results - page 85 / 169
» Open Implementation Design Guidelines
Sort
View
ASPLOS
2011
ACM
14 years 1 months ago
Pocket cloudlets
Cloud services accessed through mobile devices suffer from high network access latencies and are constrained by energy budgets dictated by the devices’ batteries. Radio and batt...
Emmanouil Koukoumidis, Dimitrios Lymberopoulos, Ka...
WWW
2005
ACM
15 years 10 months ago
Signing individual fragments of an RDF graph
Being able to determine the provenience of statements is a fundamental step in any SW trust modeling. We propose a methodology that allows signing of small groups of RDF statement...
Giovanni Tummarello, Christian Morbidoni, Paolo Pu...
AOSD
2009
ACM
15 years 4 months ago
The art of the meta-aspect protocol
ive semantics for aspect-oriented abstractions can be defined by language designers using extensible aspect compiler frameworks. However, application developers are prevented fro...
Tom Dinkelaker, Mira Mezini, Christoph Bockisch
ISSRE
2008
IEEE
15 years 4 months ago
Using Fault Modeling in Safety Cases
For many safety-critical systems a safety case is built as part of the certification or acceptance process. The safety case assembles evidence to justify that the design and imple...
Robyn R. Lutz, Ann Patterson-Hine
ICMCS
2006
IEEE
124views Multimedia» more  ICMCS 2006»
15 years 3 months ago
On the Potential of Incorporating Knowledge of Human Visual Attention into Cbir Systems
Content-based image retrieval (CBIR) systems have been actively investigated over the past decade. Several existing CBIR prototypes claim to be designed based on perceptual charac...
Oge Marques, Liam M. Mayron, Gustavo B. Borba, Hum...