Sciweavers

26354 search results - page 102 / 5271
» How we refactor, and how we know it
Sort
View
AMFG
2005
IEEE
293views Biometrics» more  AMFG 2005»
14 years 3 months ago
How to Train a Classifier Based on the Huge Face Database?
The development of web and digital camera nowadays has made it easier to collect more than hundreds of thousands of examples. How to train a face detector based on the collected en...
Jie Chen, Ruiping Wang, Shengye Yan, Shiguang Shan...
AOSD
2004
ACM
14 years 3 months ago
What are the key issues for commercial AOP use: how does AspectWerkz address them?
AspectWerkz is a framework targeted towards dynamic aspectoriented programming (AOP) in commercial applications. Based on our experience designing and supporting AspectWerkz, we h...
Jonas Bonér
LATIN
2004
Springer
14 years 3 months ago
How Expressions Can Code for Automata
In this paper we investigate how it is possible to recover an automaton from a rational expression that has been computed from that automaton. The notion of derived term of an expr...
Sylvain Lombardy, Jacques Sakarovitch
AES
2000
Springer
98views Cryptology» more  AES 2000»
14 years 2 months ago
How Well Are High-End DSPs Suited for the AES Algorithms? AES Algorithms on the TMS320C6x DSP
The National Institute of Standards and Technology (NIST) has announced that one of the design criteria for the Advanced Encryption Standard (AES) algorithm was the ability to eï¬...
Thomas J. Wollinger, Min Wang, Jorge Guajardo, Chr...
IDMS
2000
Springer
123views Multimedia» more  IDMS 2000»
14 years 1 months ago
How to Keep a Dead Man from Shooting
The state-of-the-art approach to realize consistency in distributed virtual environments (e.g., action games, multi-user virtual reality, and battlefield simulations) is dead recko...
Martin Mauve