Sciweavers

5547 search results - page 988 / 1110
» Software Variability Management
Sort
View
FPL
2008
Springer
175views Hardware» more  FPL 2008»
15 years 4 months ago
File system access from reconfigurable FPGA hardware processes in BORPH
This paper presents the design and implementation of BORPH's kernel file system layer that provides FPGA processes direct access to the general file system. Using a semantics...
Hayden Kwok-Hay So, Robert W. Brodersen
INFOSCALE
2007
ACM
15 years 4 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü
123
Voted
BILDMED
2007
142views Algorithms» more  BILDMED 2007»
15 years 4 months ago
Interfacing Global and Local CBIR Systems for Medical Image Retrieval
Abstract. Contemporary picture archiving and communication systems are limited in managing large and varied image collections, because content-based image retrieval (CBIR) methods ...
Sameer Antani, Thomas Martin Deserno, L. Rodney Lo...
145
Voted
CIIT
2007
161views Communications» more  CIIT 2007»
15 years 4 months ago
Using a two-timer scheme to detect selfish nodes in mobile ad-hoc networks
The cooperation of wireless nodes in ad hoc networks is crucial to ensure the proper working of the whole network due to the absence of infrastructure. Misbehaving nodes can drama...
H. Lui, José G. Delgado-Frias, Sirisha Medi...
CASCON
2008
100views Education» more  CASCON 2008»
15 years 4 months ago
Is it a bug or an enhancement?: a text-based approach to classify change requests
Bug tracking systems are valuable assets for managing maintenance activities. They are widely used in open-source projects as well as in the software industry. They collect many d...
Giuliano Antoniol, Kamel Ayari, Massimiliano Di Pe...