Sciweavers

1448 search results - page 108 / 290
» From Requirements to Code Revisited
Sort
View
AOSD
2011
ACM
14 years 7 months ago
An aspect-oriented approach for implementing evolutionary computation applications
Object-oriented frameworks support design and code reuse for specific application domains. To facilitate the development of evolutionary computation (EC) programs, such as geneti...
Andres J. Ramirez, Adam C. Jensen, Betty H. C. Che...
ECOOP
2005
Springer
15 years 9 months ago
The Role of Design Information in Software Evolution
Software modeling has received a lot a of attention in the last decade and now is an important support for the design process. Actually, the design process is very important to the...
Walter Cazzola, Sonia Pini, Massimo Ancona
115
Voted
CVPR
2008
IEEE
16 years 6 months ago
High quality mesostructure acquisition using specularities
We propose a technique for cheap and efficient acquisition of mesostructure normal maps from specularities, which only requires a simple LCD monitor and a digital camera. Coded il...
Yannick Francken, Tom Cuypers, Tom Mertens, Jo Gie...
FDTC
2007
Springer
124views Cryptology» more  FDTC 2007»
15 years 10 months ago
Countermeasures against Branch Target Buffer Attacks
Branch Prediction Analysis has been recently proposed as an attack method to extract the key from software implementations of the RSA public key cryptographic algorithm. In this p...
Giovanni Agosta, Luca Breveglieri, Gerardo Pelosi,...
141
Voted
SCN
2008
Springer
119views Communications» more  SCN 2008»
15 years 3 months ago
Integrating fingerprint with cryptosystem for internet-based live pay-TV system
In the last few years, live pay-TV system via internet has come to be established with the development of broadband network. To develop such a system, a mechanism for content prote...
Shuhui Hou, Tetsutaro Uehara, Takashi Satoh, Yoshi...