Sciweavers

631 search results - page 96 / 127
» Deriving Specifications from Requirements: An Example
Sort
View
NSPW
2003
ACM
14 years 18 days ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...
PVM
1997
Springer
13 years 11 months ago
Message-Passing Program Development by Ensemble
We present Ensemble, a message-passing implementation methodology, applied to PVM. Ensemble overcomes problems and complexities in developing applications in messagepassing enviro...
John Yiannis Cotronis
IMAGING
2003
13 years 8 months ago
Group Theoretical Invariants in Color Image Processing
Many image formation processes are complex interactions of several sub-processes and the analysis of the resulting images requires often to separate the influence of these sub-pr...
Reiner Lenz, Linh Viet Tran, Thanh Hai Bui
KDD
2003
ACM
205views Data Mining» more  KDD 2003»
14 years 7 months ago
The data mining approach to automated software testing
In today's industry, the design of software tests is mostly based on the testers' expertise, while test automation tools are limited to execution of pre-planned tests on...
Mark Last, Menahem Friedman, Abraham Kandel
AIPR
2007
IEEE
14 years 1 months ago
3D Scene Reconstruction through a Fusion of Passive Video and Lidar Imagery
Geometric structure of a scene can be reconstructed using many methods. In recent years, two prominent approaches have been digital photogrammetric analysis using passive stereo i...
Prudhvi Gurram, Stephen Lach, Eli Saber, Harvey E....