Sciweavers

342 search results - page 44 / 69
» Calling context abstraction with shapes
Sort
View
ISCI
2011
14 years 6 months ago
A tool for design pattern detection and software architecture reconstruction
It is well known that software maintenance and evolution are expensive activities, both in terms of invested time and money. Reverse engineering activities support the obtainment ...
Francesca Arcelli Fontana, Marco Zanoni
OPODIS
2010
14 years 9 months ago
Signature-Free Broadcast-Based Intrusion Tolerance: Never Decide a Byzantine Value
: Provide application processes with strong agreement guarantees despite failures is a fundamental problem of fault-tolerant distributed computing. Correct processes have not to be...
Achour Mostéfaoui, Michel Raynal
ECCV
2002
Springer
16 years 1 months ago
What Can Be Known about the Radiometric Response from Images?
Abstract. Brightness values of pixels in an image are related to image irradiance by a non-linear function, called the radiometric response function. Recovery of this function is i...
Michael D. Grossberg, Shree K. Nayar
IFIP
2009
Springer
15 years 6 months ago
Trusted Multiplexing of Cryptographic Protocols
Abstract. We present an analysis that determines when it is possible to multiplex a pair of cryptographic protocols. We present a transformation that improves the coverage of this ...
Jay A. McCarthy, Shriram Krishnamurthi
WADS
2007
Springer
128views Algorithms» more  WADS 2007»
15 years 6 months ago
Approximate Range Searching: The Absolute Model
Range searching is a well known problem in the area of geometric data structures. We consider this problem in the context of approximation, where an approximation parameter ε >...
Guilherme Dias da Fonseca