Sciweavers

1685 search results - page 316 / 337
» Commonality and Variability in Software Engineering
Sort
View
RE
2010
Springer
13 years 4 months ago
Risk-based Confidentiality Requirements Specification for Outsourced IT Systems
Today, companies are required to be in control of their IT assets, and to provide proof of this in the form of independent IT audit reports. However, many companies have outsourced...
Ayse Morali, Roel Wieringa
TASE
2010
IEEE
13 years 4 months ago
Automated Selection and Placement of Single Cells Using Vision-Based Feedback Control
Abstract--We present a robotic manipulation system for automated selection and transfer of individual living cells to analysis locations. We begin with a commonly used cell transfe...
Y. H. Anis, Mark Holl, Deirdre R. Meldrum
PAMI
2012
12 years 9 days ago
A Least-Squares Framework for Component Analysis
— Over the last century, Component Analysis (CA) methods such as Principal Component Analysis (PCA), Linear Discriminant Analysis (LDA), Canonical Correlation Analysis (CCA), Lap...
Fernando De la Torre
PARA
1998
Springer
14 years 2 months ago
Technologies for Teracomputing: A European Option
Abstract. Ahardware and software environment with performance above 1 Tera ops (teracomputing) is presently required to face the leading computational challenges not only in fundam...
Agostino Mathis
POPL
2012
ACM
12 years 5 months ago
Playing in the grey area of proofs
Interpolation is an important technique in verification and static analysis of programs. In particular, interpolants extracted from proofs of various properties are used in invar...
Krystof Hoder, Laura Kovács, Andrei Voronko...