Sciweavers

859 search results - page 145 / 172
» The Changing Face of Cryptography
Sort
View
REFSQ
2010
Springer
14 years 7 months ago
Challenges in Aligning Requirements Engineering and Verification in a Large-Scale Industrial Context
[Context and motivation] When developing software, coordination between different organizational units is essential in order to develop a good quality product, on time and within b...
Giedre Sabaliauskaite, Annabella Loconsole, Emelie...
GVD
2009
162views Database» more  GVD 2009»
14 years 7 months ago
Archiving and Maintaining Curated Databases
Curated databases represent a substantial amount of effort by a dedicated group of people to produce a definitive description of some subject area. The value of curated databases ...
Heiko Müller
83
Voted
ICASSP
2010
IEEE
14 years 7 months ago
Mining actor correlations with hierarchical concurrence parsing
Mining actor correlations from TV series enables semanticlevel video understanding and facilitates users to conduct correlation-based query. In this paper, we introduce a graphbas...
Kun Yuan, Hongxun Yao, Rongrong Ji, Xiaoshuai Sun
CDC
2010
IEEE
167views Control Systems» more  CDC 2010»
14 years 4 months ago
Numerical methods for the optimization of nonlinear stochastic delay systems, and an application to internet regulation
The Markov chain approximation method is an effective and widely used approach for computing optimal values and controls for stochastic systems. It was extended to nonlinear (and p...
Harold J. Kushner
JDIM
2010
125views more  JDIM 2010»
14 years 4 months ago
Building Context-Awareness Models for Mobile Applications
ABSTRACT. The design process followed to produce traditional applications needs to be enhanced to cope with new contextaware ubiquitous application requirements. With the popularit...
Chantal Taconet, Zakia Kazi-Aoul