Sciweavers

2518 search results - page 433 / 504
» Using Communication Objects During Requirements Analysis
Sort
View
CGA
1999
15 years 2 months ago
Visualizing Large Telecommunication Data Sets
displays to abstract network data and let users interactwithit.Wehaveimplementedafull-scaleSwift3D prototype, which generated the examples we present here. Swift-3D We developed Sw...
Eleftherios Koutsofios, Stephen C. North, Daniel A...
ICCV
2005
IEEE
16 years 4 months ago
Structured Light in Scattering Media
Virtually all structured light methods assume that the scene and the sources are immersed in pure air and that light is neither scattered nor absorbed. Recently, however, structur...
Srinivasa G. Narasimhan, Shree K. Nayar, Bo Sun, S...
ISBI
2009
IEEE
15 years 9 months ago
Quantitative Comparison of Spot Detection Methods in Live-Cell Fluorescence Microscopy Imaging
In live-cell fluorescence microscopy imaging, quantitative analysis of biological image data generally involves the detection of many subresolution objects, appearing as diffract...
Ihor Smal, Marco Loog, Wiro J. Niessen, Erik H. W....
JTRES
2009
ACM
15 years 9 months ago
On transforming Java-like programs into memory-predictable code
The ScopedMemory class of the RTSJ enables the organization of objects into regions. This ensures time-predictable management of dynamic memory. Using scopes forces the programmer...
Diego Garbervetsky, Sergio Yovine, Víctor A...
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
15 years 9 months ago
Practical Proactive Integrity Preservation: A Basis for Malware Defense
Unlike today’s reactive approaches, information flow based approaches can provide positive assurances about overall system integrity, and hence can defend against sophisticated...
Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karan...