Sciweavers

5278 search results - page 942 / 1056
» An Approach and Framework for Extensible Process Support Sys...
Sort
View
ESE
2006
154views Database» more  ESE 2006»
13 years 9 months ago
Prioritizing JUnit Test Cases: An Empirical Assessment and Cost-Benefits Analysis
Test case prioritization provides a way to run test cases with the highest priority earliest. Numerous empirical studies have shown that prioritization can improve a test suite�...
Hyunsook Do, Gregg Rothermel, Alex Kinneer
SIGSOFT
2008
ACM
14 years 9 months ago
Modular verification of web services using efficient symbolic encoding and summarization
We propose a novel method for modular verification of web service compositions. We first use symbolic fixpoint computations to derive conditions on the incoming messages and relat...
Fang Yu, Chao Wang, Aarti Gupta, Tevfik Bultan
INFOCOM
2009
IEEE
14 years 3 months ago
Protecting Against Network Infections: A Game Theoretic Perspective
— Security breaches and attacks are critical problems in today’s networking. A key-point is that the security of each host depends not only on the protection strategies it choo...
Jasmina Omic, Ariel Orda, Piet Van Mieghem
ACCV
2009
Springer
14 years 3 months ago
3D Reconstruction of Human Motion and Skeleton from Uncalibrated Monocular Video
Abstract. This paper introduces a new model-based approach for simultaneously reconstructing 3D human motion and full-body skeletal size from a small set of 2D image features track...
Yen-Lin Chen, Jinxiang Chai
AUSAI
2007
Springer
14 years 3 months ago
The Semantic Representation of Temporal Expressions in Text
Abstract. Temporal expressions—references to points in time or periods of time—are widespread in text, and their proper interpretation is essential for any natural language pro...
Robert Dale, Pawel P. Mazur