Sciweavers

3555 search results - page 117 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
ELPUB
2007
ACM
15 years 5 months ago
Enhancing Traditional Media Services Utilising Lessons Learnt from Successful Social Media Applications - Case Studies and Frame
The paper presents a framework for describing electronic media services. The framework was created by utilising earlier models and case studies of successful social media applicat...
Asta Bäck, Sari Vainikainen
PAMI
2007
150views more  PAMI 2007»
15 years 1 months ago
Continuous Verification Using Multimodal Biometrics
—Conventional verification systems, such as those controlling access to a secure room, do not usually require the user to reauthenticate himself for continued access to the prote...
Terence Sim, Sheng Zhang, Rajkumar Janakiraman, Sa...
IPPS
2007
IEEE
15 years 7 months ago
A Survey of Worst-Case Execution Time Analysis for Real-Time Java
As real-time systems become more prevalent, there is a need to guarantee that these increasingly complex systems perform as designed. One technique involves a static analysis to p...
Trevor Harmon, Raymond Klefstad
65
Voted
CHI
2009
ACM
16 years 2 months ago
Automatic storytelling in comics: a case study on World of Warcraft
Chia-Jung Chan This paper presents a development of our comic generation system that automatically summarizes players' actions and interactions in the virtual world. The featu...
Chia-Jung Chan, Ruck Thawonmas, Kuan-Ta Chen
IPPS
2008
IEEE
15 years 8 months ago
Programmability of the HPCS Languages: A case study with a quantum chemistry kernel
As high-end computer systems present users with rapidly increasing numbers of processors, possibly also incorporating attached co-processors, programmers are increasingly challeng...
Aniruddha G. Shet, Wael R. Elwasif, Robert J. Harr...