Sciweavers

677 search results - page 121 / 136
» Domain-Retargetable Reverse Engineering
Sort
View
CASCON
1993
117views Education» more  CASCON 1993»
13 years 11 months ago
Documenting-in-the-large vs. documenting-in-the-small
There is a signi cant di erence between documentinglarge programs and documenting small ones. By large programs we mean on the order of 1,000,000 lines, usually written by many di...
Scott R. Tilley
CIIA
2009
13 years 11 months ago
Towards WSMO Ontology Specification From Existing Web Services
Semantic Web Services (SWSs) aim to improve the possibilities for automated discovery, composition and invocation of Web Services by providing ontology-based service descriptions e...
Houda El Bouhissi, Mimoun Malki, Djelloul Bouchiha
CAD
2008
Springer
13 years 9 months ago
Identification of C1 and C2 discontinuities for surface meshes in CAD
In computer-aided design and meshing, it is often important to identify the discontinuities (singularities) in coarse surface meshes. Due to the potential low resolution and noise...
Xiangmin Jiao, Narasimha R. Bayyana
CGF
2008
129views more  CGF 2008»
13 years 9 months ago
Code Flows: Visualizing Structural Evolution of Source Code
Understanding detailed changes done to source code is of great importance in software maintenance. We present Code Flows, a method to visualize the evolution of source code geared...
Alexandru Telea, David Auber
CORR
2010
Springer
64views Education» more  CORR 2010»
13 years 9 months ago
Near-Optimal Evasion of Convex-Inducing Classifiers
Classifiers are often used to detect miscreant activities. We study how an adversary can efficiently query a classifier to elicit information that allows the adversary to evade de...
Blaine Nelson, Benjamin I. P. Rubinstein, Ling Hua...