Sciweavers

22358 search results - page 4411 / 4472
» Software Performance Engineering
Sort
View
SAC
2006
ACM
15 years 5 months ago
Automatic structured query transformation over distributed digital libraries
Structured data and complex schemas are becoming the main way to represent the information many Digital Libraries provide, thus impacting the services they offer. When searching i...
M. Elena Renda, Umberto Straccia
SACMAT
2006
ACM
15 years 5 months ago
Traust: a trust negotiation-based authorization service for open systems
In recent years, trust negotiation (TN) has been proposed as a novel access control solution for use in open system environments in which resources are shared across organizationa...
Adam J. Lee, Marianne Winslett, Jim Basney, Von We...
VRST
2006
ACM
15 years 5 months ago
Interactive modelling and tracking for mixed and augmented reality
Some tasks vital to many mixed and augmented reality systems are either too time consuming or complex to be carried out whilst the system is active. 3D scene modelling and labelli...
R. Freeman, A. Steed
ACSAC
2005
IEEE
15 years 5 months ago
Automated and Safe Vulnerability Assessment
As the number of system vulnerabilities multiplies in recent years, vulnerability assessment has emerged as a powerful system security administration tool that can identify vulner...
Fanglu Guo, Yang Yu, Tzi-cker Chiueh
ASAP
2005
IEEE
165views Hardware» more  ASAP 2005»
15 years 5 months ago
CONAN - A Design Exploration Framework for Reliable Nano-Electronics
In this paper we introduce a design methodology that allows the system/circuit designer to build reliable systems out of unreliable nano-scale components. The central point of our...
Sorin Cotofana, Alexandre Schmid, Yusuf Leblebici,...
« Prev « First page 4411 / 4472 Last » Next »