Sciweavers

859 search results - page 121 / 172
» Implementing CMMI using a Combination of Agile Methods
Sort
View
SAS
2009
Springer
149views Formal Methods» more  SAS 2009»
15 years 11 months ago
Creating Transformations for Matrix Obfuscation
There are many programming situations where it would be convenient to conceal the meaning of code, or the meaning of certain variables. This can be achieved through program transfo...
Stephen Drape, Irina Voiculescu
137
Voted
SP
2008
IEEE
129views Security Privacy» more  SP 2008»
15 years 10 months ago
Secure Web Browsing with the OP Web Browser
Abstract—Current web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems via browser-based attacks. Browser security efforts that re...
Chris Grier, Shuo Tang, Samuel T. King
CVPR
2006
IEEE
16 years 6 months ago
Local Steerable Phase (LSP) Feature for Face Representation and Recognition
In this paper, we propose a novel local steerable phase (LSP) feature extracted from the face image using steerable filter for face representation and recognition. Steerable filte...
Xiaoxun Zhang, Yunde Jia
ICRA
1998
IEEE
89views Robotics» more  ICRA 1998»
15 years 8 months ago
Parallel Microassembly with Electrostatic Force Fields
Assembly is a fundamental issue in the volume production of products that include microscopic submillimeter parts. These parts are often fabricated in parallel at high density but...
Karl-Friedrich Böhringer, Kenneth Y. Goldberg...
ECOOP
2006
Springer
15 years 7 months ago
Statement Annotations for Fine-Grained Advising
AspectJ-like languages are currently ineffective at modularizing heterogeneous concerns that are tightly coupled to the source code of the base program, such as logging, invariant...
Marc Eaddy, Alfred V. Aho