Sciweavers

12993 search results - page 2488 / 2599
» Artificial Intelligence in China
Sort
View
TSE
2010
230views more  TSE 2010»
13 years 4 months ago
Vulnerability Discovery with Attack Injection
The increasing reliance put on networked computer systems demands higher levels of dependability. This is even more relevant as new threats and forms of attack are constantly being...
João Antunes, Nuno Ferreira Neves, Miguel C...
TSE
2010
155views more  TSE 2010»
13 years 4 months ago
Incremental Test Generation for Software Product Lines
Recent advances in mechanical techniques for systematic testing have increased our ability to automatically find subtle bugs, and hence to deploy more dependable software. This pap...
Engin Uzuncaova, Sarfraz Khurshid, Don S. Batory
TSE
2010
132views more  TSE 2010»
13 years 4 months ago
ASCENT: An Algorithmic Technique for Designing Hardware and Software in Tandem
Search-based software engineering is an emerging paradigm that uses automated search algorithms to help designers iteratively find solutions to complicated design problems. For exa...
Jules White, Brian Doughtery, Douglas C. Schmidt
TVCG
2010
139views more  TVCG 2010»
13 years 4 months ago
Representation-Independent In-Place Magnification with Sigma Lenses
Focus+context interaction techniques based on the metaphor of lenses are used to navigate and interact with objects in large information spaces. They provide in-place magnification...
Emmanuel Pietriga, Olivier Bau, Caroline Appert
VC
2010
213views more  VC 2010»
13 years 4 months ago
Contrast prescription for multiscale image editing
Abstract Recently proposed edge-preserving multiscale image decompositions enable artifact-free and visually appealing image editing. As the human eye is sensitive to contrast, per...
Dawid Pajak, Martin Cadík, Tunç Ozan...
« Prev « First page 2488 / 2599 Last » Next »