Sciweavers

2125 search results - page 227 / 425
» Points with Type-2 Operations
Sort
View
146
Voted
CSMR
2006
IEEE
15 years 10 months ago
Package Patterns for Visual Architecture Recovery
Recovering the architecture is the first step towards reengineering a software system. Many reverse engineering tools use top-down exploration as a way of providing a visual and ...
Mircea Lungu, Michele Lanza, Tudor Gîrba
151
Voted
GLOBECOM
2006
IEEE
15 years 10 months ago
PACA: Peer-Assisted Channel Assignment for Home Wireless LANs
Abstract— A home network is a residential local area network, in which users are networking their PCs, laptops or wireless multimedia appliances to use a single residential acces...
Chi-Fai Wong, S.-H. Gary Chan, Jiancong Chen
141
Voted
IPPS
2006
IEEE
15 years 10 months ago
Checkpointing and rollback-recovery protocol for mobile systems with MW session guarantee
In the mobile environment, weak consistency replication of shared data is the key to obtaining high data availability, good access performance, and good scalability. Therefore new...
Jerzy Brzezinski, Anna Kobusinska, Michal Szychowi...
ISDA
2006
IEEE
15 years 10 months ago
Enhancing 3D Face Recognition By Mimics Segmentation
In this paper, we present a novel approach for face recognition and authentication based on dimensional surface matching. While most of existing methods use facial intensity image...
Boulbaba Ben Amor, Mohsen Ardabilian, Liming Chen
141
Voted
WCRE
2006
IEEE
15 years 10 months ago
Extracting Output Formats from Executables
We describe the design and implementation of FFE/x86 (File-Format Extractor for x86), an analysis tool that works on stripped executables (i.e., neither source code nor debugging ...
Junghee Lim, Thomas W. Reps, Ben Liblit