Sciweavers

1824 search results - page 98 / 365
» Practices and Techniques for Engineering Process Capability ...
Sort
View
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
15 years 9 months ago
On a Text-Processing Approach to Facilitating Autonomous Deception Detection
Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
Therani Madhusudan
UIST
1993
ACM
15 years 8 months ago
A Graphics Toolkit Based on Differential Constraints
This paper describes Bramble, a toolkit for constructing graphical editing applications. The primary focus of Bramble is improve support for graphical manipulation by employing di...
Michael Gleicher
ICSE
2007
IEEE-ACM
16 years 4 months ago
Performance Evaluation and Prediction for Legacy Information Systems
Database-centric information systems are critical to the operations of large organisations. In particular, they often process a large amount of data with stringent performance req...
Yan Jin, Antony Tang, Jun Han, Yan Liu
CODES
2005
IEEE
15 years 10 months ago
Shift buffering technique for automatic code synthesis from synchronous dataflow graphs
This paper proposes a new efficient buffer management technique called shift buffering for automatic code synthesis from synchronous dataflow graphs (SDF). Two previous buffer man...
Hyunok Oh, Nikil D. Dutt, Soonhoi Ha
TII
2011
206views Education» more  TII 2011»
14 years 11 months ago
Timing-Failure Risk Assessment of UML Design Using Time Petri Net Bound Techniques
Abstract—Software systems that do not meet their timing constraints can cause risks. In this work, we propose a comprehensive method for assessing the risk of timing failure by e...
Simona Bernardi, Javier Campos, José Merseg...