Sciweavers

3792 search results - page 711 / 759
» Techniques for Trusted Software Engineering
Sort
View
ISMVL
2010
IEEE
209views Hardware» more  ISMVL 2010»
15 years 5 months ago
Secure Design Flow for Asynchronous Multi-valued Logic Circuits
—The purpose of secure devices such as smartcards is to protect secret information against software and hardware attacks. Implementation of the appropriate protection techniques ...
Ashur Rafiev, Julian P. Murphy, Alexandre Yakovlev
ICWE
2010
Springer
15 years 5 months ago
Ranking the Linked Data: The Case of DBpedia
The recent proliferation of crowd computing initiatives on the web calls for smarter methodologies and tools to annotate, query and explore repositories. There is the need for scal...
Roberto Mirizzi, Azzurra Ragone, Tommaso Di Noia, ...
IUI
2009
ACM
15 years 5 months ago
Automatic design of a control interface for a synthetic face
Getting synthetic faces to display natural facial expressions is essential to enhance the interaction between human users and virtual characters. Yet traditional facial control te...
Nicolas Stoiber, Renaud Séguier, Gaspard Br...
76
Voted
GECCO
2009
Springer
110views Optimization» more  GECCO 2009»
15 years 5 months ago
EMO shines a light on the holes of complexity space
Typical domains used in machine learning analyses only partially cover the complexity space, remaining a large proportion of problem difficulties that are not tested. Since the ac...
Núria Macià, Albert Orriols-Puig, Es...
GPCE
2009
Springer
15 years 5 months ago
Advanced runtime adaptation for Java
Dynamic aspect-oriented programming (AOP) enables runtime adaptation of aspects, which is important for building sophisticated, aspect-based software engineering tools, such as ad...
Alex Villazón, Walter Binder, Danilo Ansalo...