Sciweavers

1445 search results - page 217 / 289
» Architectures to make Simple Visualisations using Simple Sys...
Sort
View
125
Voted
WCRE
1999
IEEE
15 years 7 months ago
Type-Check Elimination: Two Object-Oriented Reengineering Patterns
In reengineering an object-oriented system we want to benefit from the expertise developed in earlier efforts. It is therefore essential to have a way to communicate expertise at ...
Stéphane Ducasse, Tamar Richner, Robb Nebbe
SEKE
2010
Springer
15 years 1 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
INFOCOM
2012
IEEE
13 years 5 months ago
Socialize spontaneously with mobile applications
—With the proliferation of mobile devices in both smartphone and tablet form factors, it is intuitive and natural for users to socially interact with their collaborators or compe...
Zimu Liu, Yuan Feng, Baochun Li
PAMI
2012
13 years 5 months ago
Active Visual Segmentation
—Attention is an integral part of the human visual system and has been widely studied in the visual attention literature. The human eyes fixate at important locations in the scen...
Ajay K. Mishra, Yiannis Aloimonos, Loong Fah Cheon...
LISA
1994
15 years 4 months ago
The Group Administration Shell and the GASH Network Computing Environment
Managing large scale UNIX networks so that users can use resources on multiple systems is traditionally performed using NIS, NFS, and DNS. Proper use of these tools requires exact...
Jonathan Abbey