Sciweavers

694 search results - page 66 / 139
» Comparison of software architecture reverse engineering meth...
Sort
View
116
Voted
ATAL
2006
Springer
15 years 7 months ago
Automated analysis and verification of agent behavior
Comprehending and analyzing agent behavior is an arduous task due to complexities in agent systems and sophistication of agent behaviors, in addition to the common difficulties wi...
Tibor Bosse, Dung N. Lam, K. Suzanne Barber
162
Voted
MMSEC
2006
ACM
132views Multimedia» more  MMSEC 2006»
15 years 9 months ago
On achievable security levels for lattice data hiding in the known message attack scenario
This paper presents a theoretical security analysis of lattice data hiding. The security depends on the secrecy of a dither signal that randomizes the codebook. If the same secret...
Luis Pérez-Freire, Fernando Pérez-Go...
136
Voted
SAC
2000
ACM
15 years 7 months ago
Supporting Compositional Reuse in Component-Based Web Engineering
: The World Wide Web’s anticipated scope as an environment for knowledge exchange has changed dramatically. Without major modifications to its primary mechanisms the Web has turn...
Martin Gaedke, Jörn Rehse
WCRE
2009
IEEE
15 years 10 months ago
Domain Feature Model Recovery from Multiple Applications Using Data Access Semantics and Formal Concept Analysis
Feature models are widely employed in domainspecific software development to specify the domain requirements with commonality and variability. A feature model is usually construct...
Yiming Yang, Xin Peng, Wenyun Zhao
130
Voted
SIAMJO
2011
14 years 10 months ago
A Unifying Polyhedral Approximation Framework for Convex Optimization
Abstract. We propose a unifying framework for polyhedral approximation in convex optimization. It subsumes classical methods, such as cutting plane and simplicial decomposition, bu...
Dimitri P. Bertsekas, Huizhen Yu