Sciweavers

1620 search results - page 191 / 324
» Use Case Level Pointcuts
Sort
View
POPL
2012
ACM
13 years 7 months ago
Access permission contracts for scripting languages
The ideal software contract fully specifies the behavior of an operation. Often, in particular in the context of scripting languages, a full specification may be cumbersome to s...
Phillip Heidegger, Annette Bieniusa, Peter Thieman...
CHES
2009
Springer
150views Cryptology» more  CHES 2009»
15 years 6 months ago
A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions
Power-based side channel attacks are a significant security risk, especially for embedded applications. To improve the security of such devices, protected logic styles have been p...
Francesco Regazzoni, Alessandro Cevrero, Fran&cced...
ACML
2009
Springer
15 years 6 months ago
Conditional Density Estimation with Class Probability Estimators
Many regression schemes deliver a point estimate only, but often it is useful or even essential to quantify the uncertainty inherent in a prediction. If a conditional density estim...
Eibe Frank, Remco R. Bouckaert
ACCV
1998
Springer
15 years 3 months ago
Appearance Based Visual Learning and Object Recognition with Illumination Invariance
This paper describes a method for recognizing partially occluded objects under different levels of illumination brightness by using the eigenspace analysis. In our previous work, w...
Kohtaro Ohba, Yoichi Sato, Katsushi Ikeuchi
AAAI
1992
15 years 17 days ago
On the Minimality and Decomposability of Constraint Networks
Constraint networks have been shown to be useful in formulating such diverse problems as scene labeling, natural language parsing, and temporal reasoning. Given a constraint netwo...
Peter van Beek