Sciweavers

5962 search results - page 879 / 1193
» Working with Patterns and Code
Sort
View
141
Voted
JCP
2008
142views more  JCP 2008»
15 years 4 months ago
Design and Verification of Loosely Coupled Inter-Organizational Workflows with Multi-Level Security
Inter-Organizational Workflows (IOWF) become important as they provide solution for data sharing, heterogeneity in resources and work coordination at global level. However, a secur...
Boleslaw Mikolajczak, Nirmal Gami
ISI
2006
Springer
15 years 4 months ago
Analyzing the Terrorist Social Networks with Visualization Tools
Analysis of terrorist social networks is essential for discovering knowledge about the structure of terrorist organizations. Such knowledge is important for developing effective co...
Christopher C. Yang, Nan Liu, Marc Sageman
129
Voted
ML
2008
ACM
15 years 4 months ago
Unrestricted pure call-by-value recursion
Call-by-value languages commonly restrict recursive definitions by only allowing functions and syntactically explicit values in the right-hand sides. As a consequence, some very a...
Johan Nordlander, Magnus Carlsson, Andy Gill
149
Voted
JSS
2006
104views more  JSS 2006»
15 years 4 months ago
Modelling and simulation of off-chip communication architectures for high-speed packet processors
In this work, we propose a visual, custom-designed, event-driven interconnect simulation framework to evaluate the performance of off-chip multi-processor/memory communications ar...
Jacob Engel, Daniel Lacks, Taskin Koçak
PR
2008
239views more  PR 2008»
15 years 4 months ago
A real-time object detecting and tracking system for outdoor night surveillance
Autonomous video surveillance and monitoring has a rich history. Many deployed systems are able to reliably track human motion in indoor and controlled outdoor environments. Howev...
Kaiqi Huang, Liangsheng Wang, Tieniu Tan, Stephen ...