Sciweavers

2429 search results - page 229 / 486
» Using Aspects to Design a Secure System
Sort
View
114
Voted
FPLAY
2008
15 years 5 months ago
Using conflict theory to model complex societal interactions
Conflict theory can be used to explain the interactions between societies during times of turmoil and change (i.e. revolutions, strikes or everyday debates). Games have been produ...
Ben Medler, Joe Fitzgerald, Brian Magerko
145
Voted
AMR
2005
Springer
100views Multimedia» more  AMR 2005»
15 years 9 months ago
Using Segmented Objects in Ostensive Video Shot Retrieval
This paper presents a system for video shot retrieval in which shots are retrieved based on matching video objects using a combination of colour, shape and texture. Rather than mat...
Sorin Sav, Hyowon Lee, Alan F. Smeaton, Noel E. O'...
133
Voted
DAC
1995
ACM
15 years 7 months ago
Performance Analysis of Embedded Software Using Implicit Path Enumeration
—Embedded computer systems are characterized by the presence of a processor running application-specific dedicated software. A large number of these systems must satisfy real-ti...
Yau-Tsun Steven Li, Sharad Malik
134
Voted
ICSM
2003
IEEE
15 years 8 months ago
Software Systems Integration and Architectural Analysis - A Case Study
Software systems no longer evolve as separate entities but are also integrated with each other. The purpose of integrating software systems can be to increase user-value or to dec...
Rikard Land, Ivica Crnkovic
125
Voted
SOSP
2007
ACM
16 years 13 days ago
Information flow control for standard OS abstractions
ion Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek Eddie Kohler† Robert Morris MIT CSAIL †UCLA http://flum...
Maxwell N. Krohn, Alexander Yip, Micah Z. Brodsky,...