Sciweavers

1757 search results - page 304 / 352
» Secure Content Validation
Sort
View
SAFECOMP
2007
Springer
15 years 5 months ago
Safety Analysis of Safety-Critical Software for Nuclear Digital Protection System
A strategy and relating activities of a software safety analysis (SSA) are presented for the software of a digital reactor protection system where software modules in the design de...
Gee-Yong Park, Jang-Soo Lee, Se Woo Cheon, Kee-Cho...
IAT
2006
IEEE
15 years 5 months ago
Crime Pattern Detection Using Data Mining
Data mining can be used to model crime detection problems. Crimes are a social nuisance and cost our society dearly in several ways. Any research that can help in solving crimes f...
Shyam Varan Nath
APLAS
2006
ACM
15 years 5 months ago
A Practical String Analyzer by the Widening Approach
The static determination of approximated values of string expressions has many potential applications. For instance, approximated string values may be used to check the validity an...
Tae-Hyoung Choi, Oukseh Lee, Hyunha Kim, Kyung-Goo...
CODES
2005
IEEE
15 years 4 months ago
An architectural level design methodology for embedded face detection
Face detection and recognition research has attracted great attention in recent years. Automatic face detection has great potential in a large array of application areas, includin...
Vida Kianzad, Sankalita Saha, Jason Schlessman, Ga...
FIRBPERF
2005
IEEE
259views Algorithms» more  FIRBPERF 2005»
15 years 4 months ago
Performance Issues in Video Streaming Environments
The main motivation for applying capacity planning techniques to the design of Internet-based video services is that very often these systems incur significant delays that decrea...
Giuliano Casale, Paolo Cremonesi, Giuseppe Serazzi...