Sciweavers

7434 search results - page 1469 / 1487
» Still
Sort
View
FGR
2011
IEEE
244views Biometrics» more  FGR 2011»
12 years 11 months ago
Emotion representation, analysis and synthesis in continuous space: A survey
— Despite major advances within the affective computing research field, modelling, analysing, interpreting and responding to naturalistic human affective behaviour still remains...
Hatice Gunes, Björn Schuller, Maja Pantic, Ro...
FSE
2011
Springer
289views Cryptology» more  FSE 2011»
12 years 11 months ago
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
Abstract. Bellare and Kohno introduced a formal framework for the study of related-key attacks against blockciphers. They established sufficient conditions (output-unpredictabilit...
Martin R. Albrecht, Pooya Farshim, Kenny G. Paters...
ICSE
2011
IEEE-ACM
12 years 11 months ago
Inferring better contracts
Considerable progress has been made towards automatic support for one of the principal techniques available to enhance program reliability: equipping programs with extensive contr...
Yi Wei, Carlo A. Furia, Nikolay Kazmin, Bertrand M...
ICSE
2011
IEEE-ACM
12 years 11 months ago
JavAdaptor: unrestricted dynamic software updates for Java
Dynamic software updates (DSU) are one of the top-most features requested by developers and users. As a result, DSU is already standard in many dynamic programming languages. But,...
Mario Pukall, Alexander Grebhahn, Reimar Schrö...
IPM
2011
71views more  IPM 2011»
12 years 10 months ago
Improving semistatic compression via phrase-based modeling
In recent years, new semistatic word-based byte-oriented text compressors, such as Tagged Huffman and those based on Dense Codes, have shown that it is possible to perform fast d...
Nieves R. Brisaboa, Antonio Fariña, Gonzalo...
« Prev « First page 1469 / 1487 Last » Next »