Sciweavers

4074 search results - page 653 / 815
» Abstract Graph Transformation
Sort
View
ISW
2007
Springer
15 years 8 months ago
On the Concept of Software Obfuscation in Computer Security
Abstract. Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data struct...
Nikolay Kuzurin, Alexander Shokurov, Nikolay P. Va...
KSEM
2007
Springer
15 years 8 months ago
A Merging-Based Approach to Handling Inconsistency in Locally Prioritized Software Requirements
Abstract. It has been widely recognized that the relative priority of requirements can help developers to resolve inconsistencies and make some necessary trade-off decisions. Howe...
Kedian Mu, Weiru Liu, Zhi Jin, Ruqian Lu, Anbu Yue...
LCPC
2007
Springer
15 years 8 months ago
Multidimensional Blocking in UPC
Abstract. Partitioned Global Address Space (PGAS) languages offer an attractive, high-productivity programming model for programming large-scale parallel machines. PGAS languages, ...
Christopher Barton, Calin Cascaval, George Alm&aac...
MIRAGE
2007
Springer
15 years 8 months ago
Hand Gesture Recognition with a Novel IR Time-of-Flight Range Camera-A Pilot Study
Abstract We present a gesture recognition system for recognizing hand movements in near realtime. The system uses a infra-red time-of-flight range camera with up to 30 Hz framerat...
Pia Breuer, Christian Eckes, Stefan Müller 00...
MIRAGE
2007
Springer
15 years 8 months ago
3D Reconstruction of Human Faces from Occluding Contours
Abstract. In this paper we take a fresh look at the problem of extracting shape from contours of human faces. We focus on two key questions: how can we robustly fit a 3D face mode...
Michael Keller, Reinhard Knothe, Thomas Vetter