Sciweavers

1953 search results - page 246 / 391
» codes 2010
Sort
View
RAID
2010
Springer
15 years 3 months ago
Inferring Protocol State Machine from Real-World Trace
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...
Yipeng Wang, Zhibin Zhang, Li Guo
SEKE
2010
Springer
15 years 3 months ago
MMWA-ae: boosting knowledge from Multimodal Interface Design, Reuse and Usability Evaluation
The technological progress designing new devices and the scientific growth in the field of Human-Computer Interaction are enabling new interaction modalities to move from resear...
Americo Talarico Neto, Renata Pontin M. Fortes, Ra...
SOFTVIS
2010
ACM
15 years 3 months ago
Visual comparison of software architectures
Reverse engineering methods produce different descriptions of software architectures. In this work we analyze and define the task of exploring and comparing these descriptions. ...
Fabian Beck, Stephan Diehl
STTT
2010
134views more  STTT 2010»
15 years 3 months ago
A case study to evaluate the suitability of graph transformation tools for program refactoring
This article proposes a case study to evaluate the suitability of graph transformation tools for program refactoring. In order to qualify for this purpose, a graph transformation s...
Francisco Javier Pérez, Yania Crespo, Berth...
TIP
2010
357views more  TIP 2010»
15 years 3 months ago
Efficient Compression of Encrypted Grayscale Images
—Lossless compression of encrypted sources can be achieved through Slepian-Wolf coding. For encrypted real-world sources such as images, the key to improve the compression effici...
Wei Liu, Wenjun Zeng, Lina Dong, Qiuming Yao