Sciweavers

1462 search results - page 211 / 293
» The Abstract MAC Layer
Sort
View
106
Voted
ISW
2004
Springer
15 years 6 months ago
The Obfuscation Executive
Abstract. Code obfuscations are semantics-preserving code transformations used to protect a program from reverse engineering. There is generally no expectation of complete, long-te...
Kelly Heffner, Christian S. Collberg
IWCM
2004
Springer
15 years 6 months ago
Divide-and-Conquer Strategies for Estimating Multiple Transparent Motions
Abstract. Motion estimation is essential in a variety of image processing and computer vision tasks, like video coding, tracking, directional filtering and denoising, scene analys...
Cicero Mota, Ingo Stuke, Til Aach, Erhardt Barth
97
Voted
MOZ
2004
Springer
15 years 6 months ago
The Oz-E Project: Design Guidelines for a Secure Multiparadigm Programming Language
Abstract. The design and implementation of a capability secure multiparadigm language should be guided from its conception by proven principles of secure language design. In this p...
Fred Spiessens, Peter Van Roy
OTM
2004
Springer
15 years 6 months ago
A Model-Driven Approach to Designing Cross-Enterprise Business Processes
Abstract. Modeling and managing business processes that span multiple organizations involves new challenges, mainly regarding the ability to cope with change, decentralization, and...
Bernhard Bauer, Jörg P. Müller, Stephan ...
99
Voted
SAMOS
2004
Springer
15 years 6 months ago
Constraints Derivation and Propagation for Large-Scale Embedded Systems Exploration
Abstract— The translation of user requirements to system constraints and parameters during an exploration exercise is a hard problem, especially in the context of large scale emb...
Laurentiu Nicolae, Ed F. Deprettere