Sciweavers

1227 search results - page 131 / 246
» Remote Store Programming
Sort
View
ENTCS
2007
139views more  ENTCS 2007»
13 years 10 months ago
A Change-based Approach to Software Evolution
Software evolution research is limited by the amount of information available to researchers: Current version control tools do not store all the information generated by developer...
Romain Robbes, Michele Lanza
BIOSIG
2009
106views Biometrics» more  BIOSIG 2009»
13 years 8 months ago
Quantitative Standardization of Iris Image Formats
: This paper gives performance-based results for the application of a leading recognition algorithm applied to standardized iris imagery. The implementation was evaluated in NIST&#...
Patrick Grother
ICMLA
2010
13 years 7 months ago
Incremental Learning of Relational Action Rules
Abstract--In the Relational Reinforcement learning framework, we propose an algorithm that learns an action model allowing to predict the resulting state of each action in any give...
Christophe Rodrigues, Pierre Gérard, C&eacu...
IFIP
2010
Springer
13 years 4 months ago
A Formal Analysis of Authentication in the TPM
The Trusted Platform Module (TPM) is a hardware chip designed to enable computers to achieve a greater level of security than is possible in software alone. To this end, the TPM pr...
Stéphanie Delaune, Steve Kremer, Mark Dermo...
ASPLOS
2006
ACM
14 years 4 months ago
Bell: bit-encoding online memory leak detection
Memory leaks compromise availability and security by crippling performance and crashing programs. Leaks are difficult to diagnose because they have no immediate symptoms. Online ...
Michael D. Bond, Kathryn S. McKinley