Most software tools and environments help developers analyze the present and past development states of their software systems. Few approaches have investigated the potential cons...
Yuriy Brun, Reid Holmes, Michael D. Ernst, David N...
Privacy preserving data mining has been investigated extensively. The previous works mainly fall into two categories, perturbation and randomization based approaches and secure mu...
Li Liu, Murat Kantarcioglu, Bhavani M. Thuraisingh...
Many embedded applications can benefit from the flexible custom computing opportunities that FPGA technology offers. The Run-Time Reconfiguration (RTR) of the FPGA as an applicati...
Hegselmann and Krause have developed a simple yet powerful computational model for studying the opinion dynamics in societies of epistemically interacting truth-seeking agents. We...
Local features or image patches have become a standard tool in computer vision, with numerous application domains. Roughly speaking, two different types of patchbased image repres...