Sciweavers

1621 search results - page 126 / 325
» Detecting Experiences from Weblogs
Sort
View
WCRE
2003
IEEE
14 years 3 months ago
Problems Creating Task-relevant Clone Detection Reference Data
One prevalent method for evaluating the results of automated software analysis tools is to compare the tools’ output to the judgment of human experts. This evaluation strategy i...
Andrew Walenstein, Nitin Jyoti, Junwei Li, Yun Yan...
HASE
1998
IEEE
14 years 2 months ago
Design for Constraint Violation Detection in Safety-Critical Systems
In safety-critical systems, certain safety constraints must be satisfied before an operation can be performed. Such constraints typically depend on the state of the system at the ...
Satish Subramanian, Sanjai Rayadurgam, Wei-Tek Tsa...
DICTA
2008
14 years 3 days ago
Exploiting Part-Based Models and Edge Boundaries for Object Detection
This paper explores how to exploit shape information to perform object class recognition. We use a sparse partbased model to describe object categories defined by shape. The spars...
Josephine Sullivan, Oscar M. Danielsson, Stefan Ca...
PST
2004
14 years 1 days ago
A novel visualization technique for network anomaly detection
Visualized information is a technique that can encode large amounts of complex interrelated data, being at the same time easily quantified, manipulated, and processed by a human us...
Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani
IJON
2000
78views more  IJON 2000»
13 years 10 months ago
Model-free detection of synchrony in neuronal spike trains, with an application to primate somatosensory cortex
Synchronized neuronal ring has been reported in many neural systems and may play a role in the representation of sensory stimuli and the modi cation of sensory representations by ...
Arup Roy, Peter N. Steinmetz, Ken O. Johnson, Erns...