Sciweavers

708 search results - page 131 / 142
» Precise Specification and Automatic Application of Design Pa...
Sort
View
JUCS
2008
113views more  JUCS 2008»
14 years 11 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
KDD
2012
ACM
190views Data Mining» more  KDD 2012»
13 years 2 months ago
Multi-label hypothesis reuse
Multi-label learning arises in many real-world tasks where an object is naturally associated with multiple concepts. It is well-accepted that, in order to achieve a good performan...
Sheng-Jun Huang, Yang Yu, Zhi-Hua Zhou
PLDI
2004
ACM
15 years 5 months ago
Cloning-based context-sensitive pointer alias analysis using binary decision diagrams
This paper presents the first scalable context-sensitive, inclusionbased pointer alias analysis for Java programs. Our approach to context sensitivity is to create a clone of a m...
John Whaley, Monica S. Lam
GRAPHITE
2007
ACM
15 years 3 months ago
Appearance preserving octree-textures
Because of their geometric complexity, high resolution 3D models, either designed in high-end modeling packages or acquired with range scanning devices, cannot be directly used in...
Julien Lacoste, Tamy Boubekeur, Bruno Jobard, Chri...
CVIU
2011
14 years 3 months ago
Markerless reconstruction and synthesis of dynamic facial expressions
In this paper we combine methods from the field of computer vision with surface editing techniques to generate animated faces, which are all in full correspondence to each other....
Dominik Sibbing, Martin Habbecke, Leif Kobbelt