Sciweavers

1518 search results - page 300 / 304
» Cryptographic Test Correction
Sort
View
TSMC
2008
117views more  TSMC 2008»
13 years 5 months ago
Discovery of High-Level Behavior From Observation of Human Performance in a Strategic Game
This paper explores the issues faced in creating a sys-4 tem that can learn tactical human behavior merely by observing5 a human perform the behavior in a simulation. More specific...
Brian S. Stensrud, Avelino J. Gonzalez
OOPSLA
2010
Springer
13 years 5 months ago
Scalable and systematic detection of buggy inconsistencies in source code
Software developers often duplicate source code to replicate functionality. This practice can hinder the maintenance of a software project: bugs may arise when two identical code ...
Mark Gabel, Junfeng Yang, Yuan Yu, Moisés G...
SIAMIS
2010
176views more  SIAMIS 2010»
13 years 5 months ago
Optimized Conformal Surface Registration with Shape-based Landmark Matching
Surface registration, which transforms different sets of surface data into one common reference space, is an important process which allows us to compare or integrate the surface ...
Lok Ming Lui, Sheshadri R. Thiruvenkadam, Yalin Wa...
TCBB
2010
104views more  TCBB 2010»
13 years 5 months ago
Fast Hinge Detection Algorithms for Flexible Protein Structures
— Analysis of conformational changes is one of the keys to the understanding of protein functions and interactions. For the analysis, we often compare two protein structures, tak...
Tetsuo Shibuya
ICLP
2010
Springer
13 years 5 months ago
A Framework for Verification and Debugging of Resource Usage Properties: Resource Usage Verification
We present a framework for (static) verification of general resource usage program properties. The framework extends the criteria of correctness as the conformance of a program to ...
Pedro López-García, Luthfi Darmawan,...