Sciweavers

977 search results - page 146 / 196
» Soft Constraints for Security
Sort
View
SAFECOMP
2005
Springer
15 years 3 months ago
Are High-Level Languages Suitable for Robust Telecoms Software?
In the telecommunications sector product development must minimise time to market while delivering high levels of dependability, availability, maintainability and scalability. High...
Jan Henry Nyström, Philip W. Trinder, David J...
OOPSLA
2004
Springer
15 years 3 months ago
MC2: high-performance garbage collection for memory-constrained environments
Java is becoming an important platform for memory-constrained consumer devices such as PDAs and cellular phones, because it provides safety and portability. Since Java uses garbag...
Narendran Sachindran, J. Eliot B. Moss, Emery D. B...
TVLSI
2010
14 years 4 months ago
Architectural Enhancement and System Software Support for Program Code Integrity Monitoring in Application-Specific Instruction-
Program code in a computer system can be altered either by malicious security attacks or by various faults in microprocessors. At the instruction level, all code modifications are ...
Hai Lin, Yunsi Fei, Xuan Guan, Zhijie Jerry Shi
CVPR
2006
IEEE
15 years 12 months ago
Composite Templates for Cloth Modeling and Sketching
Cloth modeling and recognition is an important and challenging problem in both vision and graphics tasks, such as dressed human recognition and tracking, human sketch and portrait...
Hong Chen, Zijian Xu, Ziqiang Liu, Song Chun Zhu
ECCV
2004
Springer
15 years 12 months ago
An Accuracy Certified Augmented Reality System for Therapy Guidance
Our purpose is to provide an augmented reality system for Radio-Frequency guidance that could superimpose a 3D model of the liver, its vessels and tumors (reconstructed from CT ima...
Stéphane Nicolau, Xavier Pennec, Luc Soler,...