|Complexity Evaluation of Feature Models and Meta-Programs
Complexity Evaluation of Feature Models and Meta-Programs
Štuikys, Vytautas; Damaševičius, Robertas
|is the inherent property of systems to be ...
|... theory. In this theory a notion of
|Algorithmic Statistics: Forty Years Later
Algorithmic Statistics: Forty Years Later
Vereshchagin, Nikolay; Shen, Alexander
|of a finite object (=amount of information ...
|Evaluating code complexity triggers, use of complexity measures and the influence of code complexity on maintenance time
Evaluating code complexity triggers, use of complexity measures and the influence of code complexity on maintenance time
Antinyan, Vard; Staron, Miroslaw; Sandberg, Anna
|has been studied intensively over the past ...
|... on operationalizing the construct of
|Coordinating the Complexity of Tools, Tasks, and Users: On Theory-based Approaches to Authoring Tool Usability
Coordinating the Complexity of Tools, Tasks, and Users: On Theory-based Approaches to Authoring Tool Usability
|—for tool, task, and user. ...
|... we investigate the influence of cyclomatic
|The influence of cyclomatic complexity distribution on the understandability of xtUML models
The influence of cyclomatic complexity distribution on the understandability of xtUML models
Ukić, Nenad; Maras, Josip; Šerić, Ljiljana
|on the understandability of executable ...
|... devoted to understanding the computational
|Ontology-Mediated Query Answering with Data-Tractable Description Logics
Ontology-Mediated Query Answering with Data-Tractable Description Logics
Bienvenu, Meghyn; Ortiz, Magdalena
|of different reasoning tasks, including ...
|... of time used to measure the computational
|Time in the Analysis of Algorithms
Time in the Analysis of Algorithms
Furia, Carlo A.; Mandrioli, Dino; Morzenti, Angelo; Rossi, Matteo
|of Turing machines, on which the ...
|... the secret key) and measure their
|Key Recovery Attacks on Iterated Even–Mansour Encryption Schemes
Key Recovery Attacks on Iterated Even–Mansour Encryption Schemes
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
|by counting the number of operations they ...
|Social Complexity I: Origins and Measurement
Social Complexity I: Origins and Measurement
|is a fundamental concept in Computational ...
|... Games, Automata and Equilibrium Concepts
|Game Theory and Strategic Complexity
Game Theory and Strategic Complexity
Chatterjee, Kalyan; Sabourian, Hamid
|Considerations in Repeated Games ...
|... The linear
|Cube Theory and Stable $$k$$-Error Linear Complexity for Periodic Sequences
Cube Theory and Stable $$k$$-Error Linear Complexity for Periodic Sequences
Zhou, Jianqin; Liu, Wanquan; Zhou, Guanglu
|of a sequence has been used as an ...
|... alternatives cannot cope as well with the
|Separating Safety and Control Systems to Reduce Complexity
Separating Safety and Control Systems to Reduce Complexity
Wassyng, Alan; Lawford, Mark; Maibaum, Tom
|of modern systems. ...
|... the relationship between simplicity (or
|Simplicity, Complex Systems, and Abstraction
Simplicity, Complex Systems, and Abstraction
Saitta, Lorenza; Zucker, Jean-Daniel
|), complex systems, and abstraction in ...
|... such culture has to be reformatted into a
|The Making of Complex Systems
The Making of Complex Systems
Boy, Guy André
|... reader to generative theories of social
|Social Complexity III: Theories
Social Complexity III: Theories
|in CSS. ...
|... attack on 5 rounds, whose 2124 time
|New Attacks on IDEA with at Least 6 Rounds
New Attacks on IDEA with at Least 6 Rounds
Biham, Eli; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
|is only slightly better than exhaustive ...
|... Software project
|Classification of Software Projects’ Complexity
Classification of Software Projects’ Complexity
Fitsilis, P.; Kameas, A.; Anthopoulos, L.
|is a subject that has not received ...
|... introduces new techniques and correct
|Making the Impossible Possible
Making the Impossible Possible
Boura, Christina; Lallemand, Virginie; Naya-Plasencia, María; Suder, Valentin
|analyses for impossible differential ...
|... conducts a systematic study of cognitive
|Cognitive complexity in data modeling: causes and recommendations
Cognitive complexity in data modeling: causes and recommendations
|to reveal important factors pertaining to ...
|... the latest version of our fully automated
|TcT: Tyrolean Complexity Tool
TcT: Tyrolean Complexity Tool
Avanzini, Martin; Moser, Georg; Schaper, Michael
|analyser. implements our framework for ...
|... so far as to undermine those ends.
|Measuring the complexity of the law: the United States Code
Measuring the complexity of the law: the United States Code
Katz, Daniel Martin; Bommarito, M. J., II
|, simplicity’s inverse, taxes cognition ...
|... security. We propose Kolmogorov
|Evaluating Obfuscation Security: A Quantitative Approach
Evaluating Obfuscation Security: A Quantitative Approach
Mohsen, Rabih; Pinto, Alexandre Miranda
|, estimated by compression, as a software ...
|... appropriate for analysis of perceived
|Modeling and Simulation
Modeling and Simulation
Boy, Guy André
|of a system, device or user interface). ...
|... According to psychological theory, visual
|Photo aesthetic quality estimation using visual complexity features
Photo aesthetic quality estimation using visual complexity features
Sun, Litian; Yamasaki, Toshihiko; Aizawa, Kiyoharu
|is an important property of the stimuli, ...
|... book offers the reader an introduction to
|Complexity Economics: A New Way to Witness Capitalism
Complexity Economics: A New Way to Witness Capitalism