In order for multimedia presentations to be stored, accessed and played from a large library they should not be encoded as final form presentations, since these consume storage sp...
Lloyd Rutledge, Jacco van Ossenbruggen, Lynda Hard...
Software architecture descriptions are high-level models of software systems. Some researchers have proposed specialpurpose architectural notations that have a great deal of expre...
Jason E. Robbins, Nenad Medvidovic, David F. Redmi...
This paper focuses on in-process measurements during requirements definition where measurements of processes and products are relatively difficult. However, development processes ...
Yoshiki Mitani, Tomoko Matsumura, Mike Barker, Sei...
The task of image acquisition is completely dominated by CCD-based sensors fabricated on specialized process lines. These devices provide an essentially passive means of detecting...
Alex G. Dickinson, Bryan D. Ackland, El-Sayed Eid,...
ded abstract of this paper appears in 13th International Conference on Practice and Theory in Public Key Cryptography (PKC) 2010, Lecture Notes in Computer Science Vol. ?, P. Nguye...
Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, Vi...