Sciweavers

1636 search results - page 94 / 328
» Detecting similar software applications
Sort
View
IUI
2009
ACM
16 years 1 months ago
Subobject detection through spatial relationships on mobile phones
We present a novel image classification technique for detecting multiple objects (called subobjects) in a single image. In addition to image classifiers, we apply spatial relati...
Benjamin Brombach, Erich Bruns, Oliver Bimber
ISESE
2006
IEEE
15 years 10 months ago
An industrial case study of structural testing applied to safety-critical embedded software
Effective testing of safety-critical real-time embedded software is difficult and expensive. Many companies are hesitant about the cost of formalized criteria-based testing and a...
Jing Guan, Jeff Offutt, Paul Ammann
WOSP
2004
ACM
15 years 10 months ago
Generating realistic workloads for network intrusion detection systems
While the use of network intrusion detection systems (nIDS) is becoming pervasive, evaluating nIDS performance has been found to be challenging. The goal of this study is to deter...
Spyros Antonatos, Kostas G. Anagnostakis, Evangelo...
ICASSP
2008
IEEE
15 years 11 months ago
On the synchrony of empirical mode decompositions with application to electroencephalography
A novel approach to measure the interdependence of time series is proposed, based on the alignment (“matching”) of their Huang-Hilbert spectra. The method consists of three st...
Justin Dauwels, Tomasz M. Rutkowski, Franço...
DEXA
2003
Springer
147views Database» more  DEXA 2003»
15 years 9 months ago
Context-Aware Data Mining Framework for Wireless Medical Application
Abstract. Data mining, which aims at extracting interesting information from large collections of data, has been widely used as an effective decision making tool. Mining the datas...
Pravin Vajirkar, Sachin Singh, Yugyung Lee