Sciweavers

1448 search results - page 109 / 290
» From Requirements to Code Revisited
Sort
View
107
Voted
CVPR
2008
IEEE
16 years 6 months ago
Semi-supervised learning of multi-factor models for face de-identification
With the emergence of new applications centered around the sharing of image data, questions concerning the protection of the privacy of people visible in the scene arise. Recently...
Ralph Gross, Latanya Sweeney, Fernando De la Torre...
PLDI
2010
ACM
16 years 1 months ago
Complete Functional Synthesis
Synthesis of program fragments from specifications can make programs easier to write and easier to reason about. To integrate synthesis into programming languages, synthesis algor...
Viktor Kuncak, Mika l Mayer, Ruzica Piskac, Philip...
VL
2009
IEEE
126views Visual Languages» more  VL 2009»
15 years 10 months ago
Predicting reuse of end-user web macro scripts
Repositories of code written by end-user programmers are beginning to emerge, but when a piece of code is new or nobody has yet reused it, then current repositories provide users ...
Christopher Scaffidi, Christopher Bogart, Margaret...
VTC
2007
IEEE
15 years 10 months ago
Packet Centric vs. Radio Centric Link Layer Approaches: A Quantitative Analysis
Abstract— A well-known concept to adapt the transmitted payload to the current channel capacity is to perform segmentation of the uncoded user payload. In [1], a new cross layera...
Francesco Rossetto, Michael Meyer, Michele Zorzi
IEEECIT
2006
IEEE
15 years 10 months ago
A Trap-based Mechanism for Runtime Kernel Modification
Runtime modification of kernel code is a difficult problem. However, the need of modifiable kernel is increasing because new requirements and services that are unanticipated at th...
Young-Pil Kim, Jin-Hee Choi, Chuck Yoo