Sciweavers

1411 search results - page 218 / 283
» A Value Analysis for C Programs
Sort
View
AOSD
2004
ACM
14 years 2 months ago
Deriving security requirements from crosscutting threat descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General s...
Charles B. Haley, Robin C. Laney, Bashar Nuseibeh
SENSYS
2003
ACM
14 years 2 months ago
Tracking a moving object with a binary sensor network
In this paper we examine the role of very simple and noisy sensors for the tracking problem. We propose a binary sensor model, where each sensor’s value is converted reliably to...
Javed A. Aslam, Zack J. Butler, Florin Constantin,...
ICPR
2010
IEEE
14 years 28 days ago
Efficient Semantic Indexing for Image Retrieval
Semantic analysis of a document collection can be viewed as an unsupervised clustering of the constituent words and documents around hidden or latent concepts. This has shown to i...
Chandrika Pulla, Suman Karthik, C. V. Jawahar
PODC
2010
ACM
14 years 21 days ago
Distributed algorithms for edge dominating sets
An edge dominating set for a graph G is a set D of edges such that each edge of G is in D or adjacent to at least one edge in D. This work studies deterministic distributed approx...
Jukka Suomela
EGICE
2006
14 years 15 days ago
Combining Two Data Mining Methods for System Identification
System identification is an abductive task which is affected by several kinds of modeling assumptions and measurement errors. Therefore, instead of optimizing values of parameters ...
Sandro Saitta, Benny Raphael, Ian F. C. Smith