Sciweavers

1700 search results - page 121 / 340
» Specifying and implementing refactorings
Sort
View
TOPLAS
2008
101views more  TOPLAS 2008»
15 years 4 months ago
Verifying policy-based web services security
WS-SecurityPolicy is a declarative language for configuring web services security mechanisms. We describe a formal semantics for WS-SecurityPolicy and propose a more abstract lang...
Karthikeyan Bhargavan, Cédric Fournet, Andr...
TSP
2008
90views more  TSP 2008»
15 years 4 months ago
Array-Based QR-RLS Multichannel Lattice Filtering
An array-based algorithm for multichannel lattice filtering is proposed. The filter is formed by a set of units that are adapted locally and concurrently using recursions that clos...
J. Gomes, V. A. N. Barroso
CORR
1999
Springer
120views Education» more  CORR 1999»
15 years 4 months ago
A Machine-Independent Debugger--Revisited
Most debuggers are notoriously machine-dependent, but some recent research prototypes achieve varying degrees of machine-independence with novel designs. Cdb, a simple source-leve...
David R. Hanson
134
Voted
IGPL
2010
97views more  IGPL 2010»
15 years 3 months ago
A symbolic/subsymbolic interface protocol for cognitive modeling
Researchers studying complex cognition have grown increasingly interested in mapping symbolic cognitive architectures onto subsymbolic brain models. Such a mapping seems essential...
Patrick Simen, Thad A. Polk
SMI
2010
IEEE
167views Image Analysis» more  SMI 2010»
15 years 3 months ago
RBF Dipole Surface Evolution
—The level set method can implement a wide variety of shape modeling operations (e.g. offsetting, skeletonization, morphing, blending, smoothing, sharpening, embossing, denoising...
Yuntao Jia, Xinlai Ni, Eric Lorimer, Michael Mulla...