Sciweavers

26354 search results - page 39 / 5271
» How we refactor, and how we know it
Sort
View
ICSE
2000
IEEE-ACM
13 years 11 months ago
Automated refactoring to introduce design patterns
Software systems have to be flexible in order to cope with evolving requirements. However, since it is impossible to predict with certainty what future requirements will emerge, i...
Mel Ó Cinnéide
CHES
2004
Springer
136views Cryptology» more  CHES 2004»
14 years 1 months ago
Attacking DSA Under a Repeated Bits Assumption
We discuss how to recover the private key for DSA style signature schemes if partial information about the ephemeral keys is revealed. The partial information we examine is of a se...
Peter J. Leadbitter, Dan Page, Nigel P. Smart
BPM
2010
Springer
186views Business» more  BPM 2010»
13 years 8 months ago
How to Implement a Theory of Correctness in the Area of Business Processes and Services
During the previous years, we presented several results concerned with various issues related to the correctness of models for business processes and services (i. e., interorganiza...
Niels Lohmann, Karsten Wolf
KBSE
2008
IEEE
14 years 2 months ago
Using Cluster Analysis to Improve the Design of Component Interfaces
For large software systems, interface structure has an important impact on their maintainability and build performance. For example, for complex systems written in C, recompilatio...
Rahmat Adnan, Bas Graaf, Arie van Deursen, Joost Z...
ECCV
2008
Springer
14 years 9 months ago
Cat Head Detection - How to Effectively Exploit Shape and Texture Features
In this paper, we focus on the problem of detecting the head of cat-like animals, adopting cat as a test case. We show that the performance depends crucially on how to effectively ...
Weiwei Zhang, Jian Sun, Xiaoou Tang