Sciweavers

628 search results - page 40 / 126
» A Practical Approach to Measuring Assurance
Sort
View
HICSS
2011
IEEE
190views Biometrics» more  HICSS 2011»
12 years 11 months ago
Validating Cyber Security Requirements: A Case Study
Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, securit...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
VCBM
2010
13 years 2 months ago
A General Approach to Model Biomedical Data from 3D Unorganised Point Clouds with Medial Scaffolds
We present the latest developments in modeling 3D biomedical data via the Medial Scaffold (MS), a 3D acyclic oriented graph representation of the Medial Axis (MA) [LK07, SP08]. Th...
Frederic F. Leymarie, Ming-Ching Chang, Celina Imi...
ICASSP
2009
IEEE
14 years 2 months ago
Field inversion by consensus and compressed sensing
— We study the inversion of a random field from pointwise measurements collected by a sensor network. We assume that the field has a sparse representation in a known basis. To ...
Aurora Schmidt, José M. F. Moura
ICRA
2009
IEEE
125views Robotics» more  ICRA 2009»
13 years 5 months ago
Real-world robot navigation amongst deformable obstacles
Abstract-- In this paper, we consider the problem of mobile robots navigating in environments with non-rigid objects. Whereas robots can plan their paths more effectively when they...
Barbara Frank, Cyrill Stachniss, Ruediger Schmeddi...
ISSTA
2009
ACM
14 years 2 months ago
Automatic system testing of programs without test oracles
Metamorphic testing has been shown to be a simple yet effective technique in addressing the quality assurance of applications that do not have test oracles, i.e., for which it is ...
Christian Murphy, Kuang Shen, Gail E. Kaiser