Sciweavers

416 search results - page 51 / 84
» Some new approaches for preventing software tampering
Sort
View
MMS
2006
15 years 1 months ago
Collaborative image retrieval via regularized metric learning
In content-based image retrieval (CBIR), relevant images are identified based on their similarities to query images. Most CBIR algorithms are hindered by the semantic gap between ...
Luo Si, Rong Jin, Steven C. H. Hoi, Michael R. Lyu
TES
2001
Springer
15 years 5 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...
ROBOCUP
1999
Springer
145views Robotics» more  ROBOCUP 1999»
15 years 5 months ago
5dpo-2000 Team Description
This paper briefly describes the design principles of the hardware and software of 5dpo-2000 team. An evolutive approach is presented as the robots are constantly being improved wi...
Paulo Costa, António Moreira, Armando Sousa...
POPL
2008
ACM
16 years 1 months ago
Relevance heuristics for program analysis
Relevance heuristics allow us to tailor a program analysis to a particular property to be verified. This in turn makes it possible to improve the precision of the analysis where n...
Kenneth L. McMillan
BCS
2008
15 years 2 months ago
Beatbox - A Computer Simulation Environment for Computational Biology of the Heart
Despite over a century's study, the trigger mechanisms of cardiac arrhythmias are poorly understood. Even modern experimental methods do not provide sufficient temporal and s...
Ross McFarlane, Irina V. Biktasheva