Sciweavers

1310 search results - page 167 / 262
» On a Class of Traceability Codes
Sort
View
CVPR
2010
IEEE
14 years 6 months ago
Robust Classification of Objects, Faces, and Flowers Using Natural Image Statistics
Classification of images in many category datasets has rapidly improved in recent years. However, systems that perform well on particular datasets typically have one or more lim...
Christopher Kanan, Garrison Cottrell
SIGCSE
2010
ACM
169views Education» more  SIGCSE 2010»
14 years 5 months ago
Interfaces first (and foremost) with Java
ion is a critical concept that underlies many topics in computing science. For example, in software engineering, the distinction between a component’s behavior and its implement...
Paolo A. G. Sivilotti, Matthew Lang
COMPSAC
2008
IEEE
14 years 4 months ago
Behavioral Dependency Measurement for Change-Proneness Prediction in UML 2.0 Design Models
During the development and maintenance of ObjectOriented (OO) software, the information on the classes which are more prone to be changed is very useful. Developers and maintainer...
Ah-Rim Han, Sang-Uk Jeon, Doo-Hwan Bae, Jang-Eui H...
CSMR
2008
IEEE
14 years 4 months ago
Package Reference Fingerprint: a Rich and Compact Visualization to Understand Package Relationships
Object-oriented languages such as Java, Smalltalk, and C++ structure their programs using packages, allowing classes to be organized into named abstractions. Maintainers of large ...
Hani Abdeen, Ilham Alloui, Stéphane Ducasse...
INFOCOM
2008
IEEE
14 years 4 months ago
iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems
—In this paper, we study a new class of attacks, the invisible LOCalization (iLOC) attack, which can accurately and invisibly localize monitors of Internet threat monitoring (ITM...
Xun Wang, Wei Yu, Xinwen Fu, Dong Xuan, Wei Zhao