Sciweavers

1625 search results - page 102 / 325
» Intentionality
Sort
View
FGCS
2006
125views more  FGCS 2006»
13 years 9 months ago
Compressible memory data structures for event-based trace analysis
The article presents a new compressible memory data structure for trace events. Its primary intention is to aid the analysis of huge traces by reducing the memory requirements sig...
Andreas Knüpfer, Wolfgang E. Nagel
IJON
2006
88views more  IJON 2006»
13 years 9 months ago
Image binarization focusing on objects
: In this paper, an image binarization method based on a new discriminant criterion is proposed. The criterion emphasizes much the homogeneity of the object gray level distribution...
Songcan Chen, Daohong Li
ENTCS
2007
96views more  ENTCS 2007»
13 years 9 months ago
Cryptographic Pattern Matching
We construct a language extension for process calculi for modelling the exchange of cryptographically composed data. More specifically, we devise a succinct syntax for terms and ...
Christoffer Rosenkilde Nielsen, Flemming Nielson, ...
ENTCS
2007
133views more  ENTCS 2007»
13 years 9 months ago
Modelchecking Correctness of Refactorings - Some Experiments
Refactorings are changes made to programs, models or specifications with the intention of improving their structure and thus making them clearer, more readable and re-usable. Ref...
H.-Christian Estler, Thomas Ruhroth, Heike Wehrhei...
TISSEC
2008
100views more  TISSEC 2008»
13 years 9 months ago
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification
Overlay multicast networks are used by service providers to distribute contents such as web pages, streaming multimedia data, or security updates to a large number of users. Howeve...
Liang Xie, Sencun Zhu