Sciweavers

101 search results - page 8 / 21
» Intensions are a key to program comprehension
Sort
View
FSE
2006
Springer
99views Cryptology» more  FSE 2006»
13 years 11 months ago
Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators
The main application of stream ciphers is online-encryption of arbitrarily long data, for example when transmitting speech data between a Bluetooth headset and a mobile GSM phone o...
Matthias Krause, Dirk Stegemann
AI
2007
Springer
13 years 7 months ago
Argument based machine learning
We present a novel approach to machine learning, called ABML (argumentation based ML). This approach combines machine learning from examples with concepts from the field of argum...
Martin Mozina, Jure Zabkar, Ivan Bratko
ICCV
2011
IEEE
12 years 7 months ago
BRISK: Binary Robust Invariant Scalable Keypoints
Effective and efficient generation of keypoints from an image is a well-studied problem in the literature and forms the basis of numerous Computer Vision applications. Establishe...
Stefan Leutenegger, Margarita Chli, Roland Y. Sieg...
CORR
2010
Springer
135views Education» more  CORR 2010»
13 years 7 months ago
Automatic derivation of domain terms and concept location based on the analysis of the identifiers
Abstract. Developers express the meaning of the domain ideas in specifically selected identifiers and comments that form the target implemented code. Software maintenance requires ...
Peter Václavík, Jaroslav Porubä...
ICIP
2006
IEEE
14 years 9 months ago
Efficient Object-Based Video Inpainting
Video inpainting is the process of repairing missing regions (holes) in videos. Most automatic techniques are computationally intensive and unable to repair large holes. To tackle...
Sen-Ching S. Cheung, Jian Zhao, M. Vijay Venkatesh