Sciweavers

ICFEM
2010
Springer
13 years 2 months ago
Laws of Pattern Composition
Design patterns are rarely used on their own. They are almost always to be found composed with each other in real applications. So it is crucial that we can reason about their comp...
Hong Zhu, Ian Bayley
JSS
2002
107views more  JSS 2002»
13 years 4 months ago
On the attractiveness of the star network
In defiance of the tremendous research the star network had attracted during the last decade, no parallel machine based on this network has yet been built. In this paper, we explo...
Abdel Elah Al-Ayyoub, Khaled Day, Abdullah Al-Dhel...
AVBPA
2005
Springer
319views Biometrics» more  AVBPA 2005»
13 years 10 months ago
A Study of Brute-Force Break-ins of a Palmprint Verification System
Abstract. Biometric systems are widely applied since they offer inherent advantages over traditional knowledge-based and token-based personal authentication approaches. This has le...
Adams Wai-Kin Kong, David Zhang, Mohamed Kamel
TACAS
2007
Springer
125views Algorithms» more  TACAS 2007»
13 years 11 months ago
Type-Dependence Analysis and Program Transformation for Symbolic Execution
Symbolic execution can be problematic when applied to real applications. This paper addresses two of these problems: (1) the constraints generated during symbolic execution may be ...
Saswat Anand, Alessandro Orso, Mary Jean Harrold