Sciweavers

5525 search results - page 144 / 1105
» Verification of Model Transformations
Sort
View
94
Voted
ADC
2004
Springer
97views Database» more  ADC 2004»
15 years 8 months ago
Static Analysis of XSLT Programs
XML is becoming the dominant standard for representing and exchanging data on the World Wide Web. The ability to transform and present data in XML is crucial and XSLT (Extensible ...
Ce Dong, James Bailey
133
Voted
ICMCS
1999
IEEE
105views Multimedia» more  ICMCS 1999»
15 years 7 months ago
Key Independent Watermark Detection
Many types of pseudo-random signals have been used to embed signatures as watermarks, with spread spectrum signal techniques used to recover the signature from the encrypted data....
Ron G. van Schyndel, Andrew Z. Tirkel, Imants D. S...
129
Voted
ECCV
2006
Springer
16 years 5 months ago
Gait Recognition Using a View Transformation Model in the Frequency Domain
Gait analyses have recently gained attention as methods of identification of individuals at a distance from a camera. However, appearance changes due to view direction changes caus...
Yasushi Makihara, Ryusuke Sagawa, Yasuhiro Mukaiga...
172
Voted
GG
2008
Springer
15 years 4 months ago
Behavior Preservation in Model Refactoring Using DPO Transformations with Borrowed Contexts
Behavior preservation, namely the fact that the behavior of a model is not altered by the transformations, is a crucial property in refactoring. The most common approaches to behav...
Guilherme Rangel, Leen Lambers, Barbara König...
129
Voted
IEE
2007
120views more  IEE 2007»
15 years 3 months ago
Classification of model transformation techniques used in UML-based Web engineering
Software development techniques are continuously evolving with the goal of solving the main problems that still affect the building and maintenance of software systems: time, cost...
N. Koch