Sciweavers

3091 search results - page 164 / 619
» The Color Between Two Others
Sort
View
INFSOF
2006
102views more  INFSOF 2006»
15 years 3 months ago
Comparison of software architecture reverse engineering methods
Problems related to interactions between components is a sign of problems with the software architecture of the system and are often costly to fix. Thus it is very desirable to id...
Catherine Stringfellow, C. D. Amory, Dileep Potnur...
126
Voted
JGAA
2007
104views more  JGAA 2007»
15 years 3 months ago
Bar k-Visibility Graphs
Let S be a set of horizontal line segments, or bars, in the plane. We say that G is a bar visibility graph, and S its bar visibility representation, if there exists a one-to-one c...
Alice M. Dean, William Evans, Ellen Gethner, Joshu...
126
Voted
DEBU
1998
115views more  DEBU 1998»
15 years 3 months ago
The Case for Non-transparent Replication: Examples from Bayou
Applications that rely on replicated data have different requirements for how their data is managed. For example, some applications may require that updates propagate amongst repl...
Douglas B. Terry, Karin Petersen, Mike Spreitzer, ...
141
Voted
ATAL
2011
Springer
14 years 3 months ago
Trust as dependence: a logical approach
We propose that the trust an agent places in another agent declaratively captures an architectural connector between the two agents. We formulate trust as a generic modality expre...
Munindar P. Singh
177
Voted
WWW
2008
ACM
16 years 4 months ago
Detecting image spam using visual features and near duplicate detection
Email spam is a much studied topic, but even though current email spam detecting software has been gaining a competitive edge against text based email spam, new advances in spam g...
Bhaskar Mehta, Saurabh Nangia, Manish Gupta 0002, ...