Sciweavers

734 search results - page 80 / 147
» A Method for Teaching a Software Process based on the Person...
Sort
View
RE
2005
Springer
14 years 2 months ago
Reverse Engineering Goal Models from Legacy Code
A reverse engineering process aims at reconstructing el abstractions from source code. This paper presents a novel reverse engineering methodology for recovering stakeholder goal ...
Yijun Yu, Yiqiao Wang, John Mylopoulos, Sotirios L...
ICIP
2002
IEEE
14 years 10 months ago
Robust video text segmentation and recognition with multiple hypotheses
A method for segmenting and recognizing text embedded in video and images is proposed in this paper. In the method, multiple segmentation of the same text region is performed, thu...
Jean-Marc Odobez, Datong Chen
EUSFLAT
2003
128views Fuzzy Logic» more  EUSFLAT 2003»
13 years 10 months ago
Hardware implementation of a fuzzy Petri net based on VLSI digital circuits
Industrial processes can be often modelled using Petri nets. If all the process variables (or events) are assumed to be twovalued signals, then it is possible to obtain a hardware...
Jacek Kluska, Zbigniew Hajduk
ICSM
2009
IEEE
14 years 3 months ago
Experimental assessment of manual versus tool-based maintenance of GUI-directed test scripts
Since manual black-box testing of GUI-based APplications (GAPs) is tedious and laborious, test engineers create test scripts to automate the testing process. These test scripts in...
Mark Grechanik, Qing Xie, Chen Fu
MMSEC
2004
ACM
126views Multimedia» more  MMSEC 2004»
14 years 2 months ago
Key-dependency for a wavelet-based blind watermarking algorithm
When a host image is watermarked multiple times by the same algorithm collisions can occur. This makes it difficult for an image to host multiple watermarks. But this hosting is n...
Michael Brachtl, Andreas Uhl, Werner Dietl