Sciweavers

31 search results - page 3 / 7
» Detection of Global Predicates: Techniques and Their Limitat...
Sort
View
CAV
2009
Springer
206views Hardware» more  CAV 2009»
14 years 7 months ago
D-Finder: A Tool for Compositional Deadlock Detection and Verification
D-Finder tool implements a compositional method for the verification of component-based systems described in BIP language encompassing multi-party interaction. For deadlock detecti...
Saddek Bensalem, Marius Bozga, Thanh-Hung Nguyen, ...
TIFS
2008
129views more  TIFS 2008»
13 years 7 months ago
On Empirical Recognition Capacity of Biometric Systems Under Global PCA and ICA Encoding
Performance of biometric-based recognition systems depends on various factors: database quality, image preprocessing, encoding techniques, etc. Given a biometric database and a se...
Natalia A. Schmid, Francesco Nicolo
ICDE
2003
IEEE
144views Database» more  ICDE 2003»
14 years 8 months ago
Scalable template-based query containment checking for web semantic caches
Semantic caches, originally proposed for client-server database systems, are being recently deployed to accelerate the serving of dynamic web content by transparently caching data...
Khalil Amiri, Sanghyun Park, Renu Tewari, Sriram P...
ICSE
2008
IEEE-ACM
14 years 7 months ago
Scalable detection of semantic clones
Several techniques have been developed for identifying similar code fragments in programs. These similar fragments, referred to as code clones, can be used to identify redundant c...
Mark Gabel, Lingxiao Jiang, Zhendong Su
MICCAI
2002
Springer
14 years 7 months ago
Detecting Wedge Shaped Defects in Polarimetric Images of the Retinal Nerve Fiber Layer
Wedge shaped defects of the retinal nerve fiber layer (RNFL) may occur in glaucoma. Currently, automatic detection of wedge shaped defects in Scanning Laser Polarimetry images of t...
Koen Vermeer, Frans Vos, Hans Lemij, Albert M. Vos...