Sciweavers

5843 search results - page 1026 / 1169
» Software Security in Practice
Sort
View
ICDE
2009
IEEE
159views Database» more  ICDE 2009»
15 years 11 months ago
Efficient Private Record Linkage
— Record linkage is the computation of the associations among records of multiple databases. It arises in contexts like the integration of such databases, online interactions and...
Mohamed Yakout, Mikhail J. Atallah, Ahmed K. Elmag...
CHI
2009
ACM
15 years 11 months ago
Coordinating tasks on the commons: designing for personal goals, expertise and serendipity
How is work created, assigned, and completed on large-scale, crowd-powered systems like Wikipedia? And what design principles might enable these federated online systems to be mor...
Michel Krieger, Emily Margarete Stark, Scott R. Kl...
SAC
2009
ACM
15 years 11 months ago
Optimal service level allocation in environmentally powered embedded systems
Energy management is a critical concern in the design of embedded systems to prolong the lifetime or to maximize the performance under energy constraints. In particular, the emerg...
Clemens Moser, Jian-Jia Chen, Lothar Thiele
CRV
2009
IEEE
132views Robotics» more  CRV 2009»
15 years 11 months ago
A Vision-Based Control and Interaction Framework for a Legged Underwater Robot
We present a vision-based control and interaction framework for mobile robots, and describe its implementation in a legged amphibious robot. The control scheme enables the robot t...
Junaed Sattar, Gregory Dudek
WCRE
2009
IEEE
15 years 11 months ago
The Logical Modularity of Programs
Abstract—The principles and best practices of object oriented design require that modules in a program should match logical decomposition of the knowledge that the program implem...
Daniel Ratiu, Radu Marinescu, Jan Jürjens
« Prev « First page 1026 / 1169 Last » Next »