Sciweavers

694 search results - page 120 / 139
» Comparison of software architecture reverse engineering meth...
Sort
View
COR
2010
150views more  COR 2010»
14 years 12 months ago
Black box scatter search for general classes of binary optimization problems
The purpose of this paper is to apply the scatter search methodology to general classes of binary problems. We focus on optimization problems for which the solutions are represent...
Francisco Gortázar, Abraham Duarte, Manuel ...
DAS
2010
Springer
15 years 4 months ago
IAMonDo-database: an online handwritten document database with non-uniform contents
In this paper we present a new database of online handwritten documents with different contents such as text, drawings, diagrams, formulas, tables, lists, and markings. It was de...
Emanuel Indermühle, Marcus Liwicki, Horst Bun...
PEPM
2007
ACM
15 years 5 months ago
Tasks: language support for event-driven programming
The event-driven programming style is pervasive as an efficient method for interacting with the environment. Unfortunately, the event-driven style severely complicates program mai...
Jeffrey Fischer, Rupak Majumdar, Todd D. Millstein
INFORMATICALT
2007
171views more  INFORMATICALT 2007»
14 years 11 months ago
E-Learning Documentation of Historical Living Systems with 3-D Modeling Functionality
The innovations and improvements in digital imaging sensors and scanners, computer modeling, haptic equipments and e-learning technology, as well as the availability of many powerf...
Athanasios D. Styliadis
FMSP
2000
ACM
152views Formal Methods» more  FMSP 2000»
15 years 4 months ago
Fault origin adjudication
When a program P fails to satisfy a requirement R supposedly ensured by a detailed speci cation S that was used to implement P, there is a question about whether the problem arise...
Karthikeyan Bhargavan, Carl A. Gunter, Davor Obrad...