Sciweavers

3555 search results - page 572 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
121
Voted
MMSEC
2006
ACM
220views Multimedia» more  MMSEC 2006»
15 years 9 months ago
Robust blind watermarking mechanism for motion data streams
The commercial reuse of 3D motion capture (Mocap) data in animation and life sciences raises issues with respect to its copyright. In order to improvise content protection of Moca...
Parag Agarwal, Ketaki Adi, B. Prabhakaran
LREC
2008
114views Education» more  LREC 2008»
15 years 5 months ago
UFRA: a UIMA-based Approach to Federated Language Resource Architecture
In this paper we address the issue of developing an interoperable infrastructure for language resources and technologies. In our approach, called UFRA, we extend the Federate Data...
Riccardo Del Gratta, Roberto Bartolini, Tommaso Ca...
ICCD
2008
IEEE
167views Hardware» more  ICCD 2008»
15 years 10 months ago
Exploiting spare resources of in-order SMT processors executing hard real-time threads
— We developed an SMT processor that allows a static WCET analysis of several hard real-time threads and uses the remaining resources for soft or non real-time threads. The analy...
Jörg Mische, Sascha Uhrig, Florian Kluge, The...
HASKELL
2006
ACM
15 years 9 months ago
Strongly typed memory areas programming systems-level data structures in a functional language
Modern functional languages offer several attractive features to support development of reliable and secure software. However, in our efforts to use Haskell for systems programmin...
Iavor S. Diatchki, Mark P. Jones
175
Voted
BMCBI
2006
94views more  BMCBI 2006»
15 years 3 months ago
Genepi: a blackboard framework for genome annotation
Background: Genome annotation can be viewed as an incremental, cooperative, data-driven, knowledge-based process that involves multiple methods to predict gene locations and struc...
Stéphane Descorps-Declère, Danielle ...