Sciweavers

562 search results - page 29 / 113
» An Analysis of Transformational Analogy: General Framework a...
Sort
View
CCS
2008
ACM
13 years 10 months ago
Is complexity really the enemy of software security?
Software complexity is often hypothesized to be the enemy of software security. We performed statistical analysis on nine code complexity metrics from the JavaScript Engine in the...
Yonghee Shin, Laurie Williams
CC
2010
Springer
135views System Software» more  CC 2010»
13 years 8 months ago
Counting Irreducible Components of Complex Algebraic Varieties
Abstract. We present an algorithm for counting the irreducible components of a complex algebraic variety defined by a fixed number of polynomials encoded as straight-line programs ...
Peter Bürgisser, Peter Scheiblechner
ICDAR
2011
IEEE
12 years 8 months ago
Non-rigid Registration and Restoration of Double-Sided Historical Manuscripts
This paper presents a fully automatic framework for the restoration of double-sided historical manuscripts which are impaired by ink bleed-through distortions. First, the recto si...
Jie Wang, Chew Lim Tan
JAIR
2010
130views more  JAIR 2010»
13 years 7 months ago
A Constraint Satisfaction Framework for Executing Perceptions and Actions in Diagrammatic Reasoning
Diagrammatic reasoning (DR) is pervasive in human problem solving as a powerful adjunct to symbolic reasoning based on language-like representations. The research reported in this...
Bonny Banerjee, B. Chandrasekaran
JIT
1999
Springer
123views Database» more  JIT 1999»
14 years 22 days ago
Byte Code Engineering
The term “Java” is used to denote two different concepts: the language itself and the related execution environment, the Java Virtual Machine (JVM), which executes byte code in...
Markus Dahm