Sciweavers

4209 search results - page 803 / 842
» Software Change and Evolution
Sort
View
CCS
2011
ACM
14 years 4 months ago
Automatic error finding in access-control policies
Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to prote...
Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripun...
HPDC
2012
IEEE
13 years 6 months ago
Dynamic adaptive virtual core mapping to improve power, energy, and performance in multi-socket multicores
Consider a multithreaded parallel application running inside a multicore virtual machine context that is itself hosted on a multi-socket multicore physical machine. How should the...
Chang Bae, Lei Xia, Peter A. Dinda, John R. Lange
193
Voted
ICSE
2012
IEEE-ACM
13 years 6 months ago
WitchDoctor: IDE support for real-time auto-completion of refactorings
—Integrated Development Environments (IDEs) have come to perform a wide variety of tasks on behalf of the programmer, refactoring being a classic example. These operations have u...
Stephen R. Foster, William G. Griswold, Sorin Lern...
ICPR
2004
IEEE
16 years 5 months ago
Face Authentication Test on the BANCA Database
This paper details the results of a Face Authentication Test (FAT2004) [2] held in conjunction with the 17th International Conference on Pattern Recognition. The contest was held ...
Kieron Messer, Josef Kittler, Mohammad Sadeghi, Mi...
ICCV
2009
IEEE
16 years 9 months ago
Light Field Video Stabilization
We describe a method for producing a smooth, stabilized video from the shaky input of a hand-held light field video camera— specifically, a small camera array. Traditional stab...
Brandon M. Smith, Li Zhang, Hailin Jin, Aseem Agar...