Sciweavers

7106 search results - page 361 / 1422
» Restricted Complexity, General Complexity
Sort
View
CCS
2007
ACM
15 years 11 months ago
Program obfuscation: a quantitative approach
Despite the recent advances in the theory underlying obfuscation, there still is a need to evaluate the quality of practical obfuscating transformations more quickly and easily. T...
Bertrand Anckaert, Matias Madou, Bjorn De Sutter, ...
CVPR
2006
IEEE
15 years 11 months ago
Recognition of Composite Human Activities through Context-Free Grammar Based Representation
This paper describes a general methodology for automated recognition of complex human activities. The methodology uses a context-free grammar (CFG) based representation scheme to ...
Michael S. Ryoo, J. K. Aggarwal
156
Voted
GECCO
2005
Springer
220views Optimization» more  GECCO 2005»
15 years 10 months ago
Scale invariant pareto optimality: a meta--formalism for characterizing and modeling cooperativity in evolutionary systems
This article describes a mathematical framework for characterizing cooperativity in complex systems subject to evolutionary pressures. This framework uses three foundational compo...
Mark Fleischer
153
Voted
WEBDB
2005
Springer
97views Database» more  WEBDB 2005»
15 years 10 months ago
Towards a Query Language for Multihierarchical XML: Revisiting XPath
In recent years it has been argued that when XML encodings become complex, DOM trees are no longer adequate for query processing. Alternative representations of XML documents, suc...
Ionut Emil Iacob, Alex Dekhtyar
117
Voted
ASSETS
2004
ACM
15 years 10 months ago
Accessibility of Internet websites through time
Using Internet Archive’s Wayback Machine, a random sample of websites from 1997-2002 were retrospectively analyzed for effects that technology has on accessibility for persons w...
Stephanie Hackett, Bambang Parmanto, Xiaoming Zeng