Sciweavers

761 search results - page 92 / 153
» Reverse engineering MAC
Sort
View
CAISE
2005
Springer
14 years 1 months ago
Ontology Management: a Case Study and Research Plans
We foresee that ontologies for interoperability are likely organized by a loosely linked network. In the case of digital libraries, the network is realized by a federation of ontol...
Jeroen Hoppenbrouwers, Manfred A. Jeusfeld, Hans W...
UIST
2004
ACM
14 years 1 months ago
The radial scroll tool: scrolling support for stylus- or touch-based document navigation
We present radial scroll, an interface widget to support scrolling particularly on either small or large scale touch displays. Instead of dragging a elevator in a scroll bar, or u...
Gary M. Smith, Monica M. C. Schraefel
ISW
2004
Springer
14 years 1 months ago
The Obfuscation Executive
Abstract. Code obfuscations are semantics-preserving code transformations used to protect a program from reverse engineering. There is generally no expectation of complete, long-te...
Kelly Heffner, Christian S. Collberg
FATES
2003
Springer
14 years 1 months ago
Using a Software Testing Technique to Improve Theorem Proving
Most efforts to combine formal methods and software testing go in the direction of exploiting formal methods to solve testing problems, most commonly test case generation. Here we ...
Reiner Hähnle, Angela Wallenburg
FUN
2010
Springer
306views Algorithms» more  FUN 2010»
14 years 26 days ago
Leveling-Up in Heroes of Might and Magic III
We propose a model for level-ups in Heroes of Might and Magic III, and give an O 1 ε2 ln 1 δ learning algorithm to estimate the probabilities of secondary skills induced by any ...
Dimitrios I. Diochnos