Sciweavers

1821 search results - page 275 / 365
» Security-Aware Program Transformations
Sort
View
92
Voted
ICPR
2006
IEEE
15 years 6 months ago
Class Separability in Spaces Reduced By Feature Selection
We investigated the geometrical complexity of several high-dimensional, small sample classification problems and its changes due to two popular feature selection procedures, forw...
Erinija Pranckeviciene, TinKam Ho, Ray L. Somorjai
94
Voted
ITNG
2006
IEEE
15 years 6 months ago
Secure Two-Way Transfer of Measurement Data
We introduce a measurement system architecture, which has three main qualities: secure two-way transfer of measurement data, quick adaptability to different kinds of measurement ...
Marko Hassinen, Maija Marttila-Kontio, Mikko Saesm...
119
Voted
ACIVS
2006
Springer
15 years 6 months ago
Stereo Matching Using Scanline Disparity Discontinuity Optimization
We propose a scanline energy minimization algorithm for stereo vision. The proposed algorithm differs from conventional energy minimization techniques in that it focuses on the re...
Ho Yub Jung, Kyoung Mu Lee, Sang Uk Lee
108
Voted
DEXAW
2005
IEEE
176views Database» more  DEXAW 2005»
15 years 6 months ago
A Data Warehousing Environment to Monitor Metrics in Software Development Processes
Software organizations follow capability models in order to aggregate quality to their processes and products. Process measurement and analysis are key issues, but their implement...
Duncan Dubugras A. Ruiz, Karin Becker, Taisa C. No...
99
Voted
IWPSE
2005
IEEE
15 years 6 months ago
The LAN-simulation: A Refactoring Teaching Example
The notion of refactoring —transforming the sourcecode of an object-oriented program without changing its external behaviour — has been studied intensively within the last dec...
Serge Demeyer, Filip Van Rysselberghe, Tudor G&ici...