Sciweavers

199 search results - page 17 / 40
» Implementing Circularity Using Partial Evaluation
Sort
View
CCS
2007
ACM
14 years 1 months ago
Polyglot: automatic extraction of protocol message format using dynamic binary analysis
Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for m...
Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiao...
ISMDA
2005
Springer
14 years 27 days ago
Endocardial Tracking in Contrast Echocardiography Using Optical Flow
Myocardial Contrast Echocardiography (MCE) is a recent technique that allows to measure regional perfusion in the cardiac wall. Segmentation of MCE sequences would allow simultaneo...
Norberto Malpica, Juan Francisco Garamendi, Manuel...
ICISS
2009
Springer
13 years 5 months ago
Method-Specific Java Access Control via RMI Proxy Objects Using Annotations
We propose a novel approach for granting partial access on arbitrary objects at the granularity of methods to remote clients. The applications that we target use Remote Method Invo...
Jeff Zarnett, Patrick Lam, Mahesh V. Tripunitara
AICT
2005
IEEE
139views Communications» more  AICT 2005»
14 years 1 months ago
Searching for PI Resources on MANETs Using JXTA
This paper presents an evaluation of partial and intermittent (PI) resource support on JXTA and proposes a new MANET rendezvous service, optimized for handling PI resources. JXTA ...
Rodolfo Oliveira, Luis Bernardo, Nelson Ruivo, Pau...
IJIT
2004
13 years 8 months ago
Improving the Convergence of the Backpropagation Algorithm Using Local Adaptive Techniques
Since the presentation of the backpropagation algorithm, a vast variety of improvements of the technique for training a feed forward neural networks have been proposed. This articl...
Z. Zainuddin, N. Mahat, Y. Abu Hassan