Sciweavers

356 search results - page 44 / 72
» Effects of dependence in high-dimensional multiple testing p...
Sort
View
TSE
2010
230views more  TSE 2010»
13 years 2 months ago
Vulnerability Discovery with Attack Injection
The increasing reliance put on networked computer systems demands higher levels of dependability. This is even more relevant as new threats and forms of attack are constantly being...
João Antunes, Nuno Ferreira Neves, Miguel C...
ICSE
2005
IEEE-ACM
14 years 7 months ago
An empirical study of fault localization for end-user programmers
End users develop more software than any other group of programmers, using software authoring devices such as e-mail filtering editors, by-demonstration macro builders, and spread...
Joseph R. Ruthruff, Margaret M. Burnett, Gregg Rot...
TSMC
2002
114views more  TSMC 2002»
13 years 7 months ago
Exploiting design information to derive object distribution models
Object-orientation and distributed systems are quickly becoming norms for new system development, generating renewed interest in distribution schemes traditionally directed at rela...
Sandeep Purao, Hemant K. Jain, Derek L. Nazareth
ICCV
2007
IEEE
14 years 1 months ago
A Multi-Image Restoration Method for Image Reconstruction from Projections
in Proc. IEEE Int’l Conf. on Computer Vision (ICCV), October, 2007 Traditional Bayesian restoration methods depend heavily on the accuracy of underlying generative models. For t...
Yunqiang Chen, Lin Cheng, Tong Fang, Rainer Raupac...
IJVR
2008
169views more  IJVR 2008»
13 years 7 months ago
Agent Architecture for a Real World Autonomous Virtual Guide: Interaction between the Decision and Perception Processes and Envi
Museums like marine aquariums are facing a difficult problem when trying to deliver information to their visitors. The exhibits they propose are dynamic by definition. Each may con...
Morgan Veyret, Eric Maisel, Jacques Tisseau