Sciweavers

5962 search results - page 944 / 1193
» Working with Patterns and Code
Sort
View
SP
2007
IEEE
110views Security Privacy» more  SP 2007»
15 years 11 months ago
A Systematic Approach to Uncover Security Flaws in GUI Logic
To achieve end-to-end security, traditional machine-to-machine security measures are insufficient if the integrity of the human-computer interface is compromised. GUI logic flaws ...
José Meseguer, Ralf Sasse, Helen J. Wang, Y...
WECWIS
2007
IEEE
80views ECommerce» more  WECWIS 2007»
15 years 11 months ago
Massive Catalog Index based Search for e-Catalog Matching
In e-commerce environment, business partners exchange product information in the form of ecatalogs. Since each business player uses his/her own classification and identification c...
Jae-won Lee, Taehee Lee, Sangkeun Lee, Ok-Ran Jeon...
ACIVS
2007
Springer
15 years 10 months ago
Multiview Depth-Image Compression Using an Extended H.264 Encoder
This paper presents a predictive-coding algorithm for the compression of multiple depth-sequences obtained from a multi-camera acquisition setup. The proposed depth-prediction algo...
Yannick Morvan, Dirk Farin, Peter H. N. de With
159
Voted
AIHC
2007
Springer
15 years 10 months ago
Instinctive Computing
Instinctive computing is a computational simulation of biological and cognitive instincts. It is a meta-program of life, just like universal gravity in nature. It profoundly influe...
Yang Cai
AOSE
2007
Springer
15 years 10 months ago
O-MaSE: A Customizable Approach to Developing Multiagent Development Processes
This paper describes the Organization-based Multiagent System Engineering (O-MaSE) Process Framework, which helps process engineers define custom multiagent systems development pr...
Juan C. García-Ojeda, Scott A. DeLoach, Rob...