Sciweavers

1425 search results - page 126 / 285
» Distributed Development of Complex Software Systems with Obj...
Sort
View
IPPS
2005
IEEE
14 years 2 months ago
On the Optimal Placement of Secure Data Objects over Internet
Secret sharing algorithms have been used for intrusion tolerance, which ensure the confidentiality, integrity and availability of critical information. However, dynamically changi...
Manghui Tu, Peng Li, Qingkai Ma, I-Ling Yen, Farok...
ICSE
1995
IEEE-ACM
14 years 23 days ago
Reverse Engineering of Legacy Code Exposed
— Reverse engineering of large legacy software systems generally cannot meet its objectives because it cannot be cost-effective. There are two main reasons for this. First, it is...
Bruce W. Weide, Wayne D. Heym, Joseph E. Hollingsw...
GECCO
2009
Springer
258views Optimization» more  GECCO 2009»
14 years 1 months ago
Evolutionary learning of local descriptor operators for object recognition
Nowadays, object recognition is widely studied under the paradigm of matching local features. This work describes a genetic programming methodology that synthesizes mathematical e...
Cynthia B. Pérez, Gustavo Olague
EDBTW
2010
Springer
13 years 7 months ago
Using web-based personalization on spatial data warehouses
Spatial data warehouses (SDW) rely on extended multidimensional (MD) models in order to provide decision makers with appropriate structures to intuitively analyse spatial data. Se...
Octavio Glorio, Jose-Norberto Mazón, Irene ...
CASES
2006
ACM
14 years 3 months ago
Adaptive object code compression
Previous object code compression schemes have employed static and semiadaptive compression algorithms to reduce the size of instruction memory in embedded systems. The suggestion ...
John Gilbert, David M. Abrahamson