Sciweavers

1821 search results - page 135 / 365
» Security-Aware Program Transformations
Sort
View
ICMLC
2010
Springer
13 years 7 months ago
An ontology-supported ubiquitous interface agent for cloud computing - Example on Bluetooth wireless technique with Java program
: This paper focused on designing of a ubiquitous interface agent based on the ontology technology and interaction diagram with the backend information agent system, i.e., OntoIAS,...
Sheng-Yuan Yang, Chun-Liang Hsu, Dong-Liang Lee
ICCV
2009
IEEE
15 years 2 months ago
Filter Flow
The filter flow problem is to compute a space-variant linear filter that transforms one image into another. This framework encompasses a broad range of transformations including...
Steven M. Seitz, Simon Baker
ISW
2004
Springer
14 years 2 months ago
The Obfuscation Executive
Abstract. Code obfuscations are semantics-preserving code transformations used to protect a program from reverse engineering. There is generally no expectation of complete, long-te...
Kelly Heffner, Christian S. Collberg
VL
2002
IEEE
129views Visual Languages» more  VL 2002»
14 years 2 months ago
A Data Mapping Specification Environment Using a Concrete Business Form-Based Metaphor
Many systems require data transformation – the conversion of complex data from one format to another. Most current approaches require programming, scripting bstract visual speci...
Yongqiang Li, John C. Grundy, Robert Amor, John G....
ATAL
2010
Springer
13 years 9 months ago
Time constraints in mixed multi-unit combinatorial auctions
We extend the framework of mixed multi-unit combinatorial auctions to include time constraints, present an expressive bidding language, and show how to solve the winner determinati...
Andreas Witzel, Ulle Endriss