Sciweavers

3555 search results - page 210 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
SEMWEB
2009
Springer
15 years 10 months ago
Using Hybrid Search and Query for E-discovery Identification
: © Using hybrid search and query for e-discovery identification Dave Grosvenor, Andy Seaborne HP Laboratories HPL-2009-155 SPARQL, e-discovery, identification, hybrid search and ...
Dave Grosvenor, Andy Seaborne
JMM2
2007
117views more  JMM2 2007»
15 years 4 months ago
Image Segmentation using Multi-Coloured Active Illumination
— In this paper, the use of active illumination is extended to image segmentation, specifically in the case of overlapping particles. This work is based on Multi-Flash Imaging (M...
Tze Ki Koh, Nicholas Miles, Steve Morgan, Barrie H...
GPCE
2007
Springer
15 years 8 months ago
Library composition and adaptation using c++ concepts
Large scale software is composed of libraries produced by different entities. Non-intrusive and efficient mechanisms for adapting data structures from one library to conform to AP...
Jaakko Järvi, Matthew A. Marcus, Jacob N. Smi...
SAC
2006
ACM
15 years 10 months ago
Ubiquitous presence systems
Instant messaging has become a part of our daily live. Instant communication, either with a mobile device or with a computer based application, is an increasingly used form of com...
Matthias Kranz, Paul Holleis, Albrecht Schmidt
AUTOMATICA
2008
167views more  AUTOMATICA 2008»
15 years 4 months ago
Stability and robustness analysis of nonlinear systems via contraction metrics and SOS programming
A wide variety of stability and performance questions about linear dynamical systems can be reformulated as convex optimization problems involving linear matrix inequalities (LMIs...
Erin M. Aylward, Pablo A. Parrilo, Jean-Jacques E....