We describe our experience applying tabular mathematical approaches to software specifications. Our purpose is to show alternative approaches to writing tabular specifications and...
Robert L. Baber, David Lorge Parnas, Sergiy A. Vil...
There have been various secure routing protocols proposed for mobile ad hoc networks. Most of these protocols are analyzed by two standard techniques: simulation and security anal...
Yuxia Lin, Amir Hamed Mohsenian Rad, Vincent W. S....
Resistance spot welding is an important and widely used method for joining metal objects. In this paper, various classification methods for identifying welding processes are evalua...
Eija Haapalainen, Perttu Laurinen, Heli Junno, Lau...
Abstract. A new approach is proposed to recover the relative magnitude of Gaussian curvature from three shading images using neural network. Under the assumption that the test obje...
In this paper, a novel system is proposed to recognize facial expression based on face sketch, which is produced by programmable graphics hardware-GPU(Graphics Processing Unit). Fi...
Jiajun Bu, Mingli Song, Qi Wu, Chun Chen, Cheng Ji...