Sciweavers

1096 search results - page 143 / 220
» Computation Slicing: Techniques and Theory
Sort
View
ECEASST
2010
13 years 6 months ago
GUI Inspection from Source Code Analysis
Abstract: Graphical user interfaces (GUIs) are critical components of todays software. Given their increased relevance, correctness and usability of GUIs are becoming essential. Th...
João Carlos Silva 0002, José Creissa...
TVCG
2012
196views Hardware» more  TVCG 2012»
11 years 11 months ago
Robust Morse Decompositions of Piecewise Constant Vector Fields
—In this paper, we introduce a new approach to computing a Morse decomposition of a vector field on a triangulated manifold surface. The basic idea is to convert the input vector...
Andrzej Szymczak, Eugene Zhang
IPCCC
2006
IEEE
14 years 3 months ago
Optimising malware
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
José M. Fernandez, Pierre-Marc Bureau
IDEAS
2008
IEEE
80views Database» more  IDEAS 2008»
14 years 3 months ago
Improved count suffix trees for natural language data
With more and more natural language text stored in databases, handling respective query predicates becomes very important. Optimizing queries with predicates includes (sub)string ...
Guido Sautter, Cristina Abba, Klemens Böhm
TIT
2008
83views more  TIT 2008»
13 years 9 months ago
Constrained Codes as Networks of Relations
We address the well-known problem of determining the capacity of constrained coding systems. While the onedimensional case is well understood to the extent that there are technique...
Moshe Schwartz, Jehoshua Bruck