Sciweavers

635 search results - page 12 / 127
» Four states are enough!
Sort
View
JCDL
2003
ACM
94views Education» more  JCDL 2003»
14 years 24 days ago
Content Access Characterization in Digital Libraries
To support non-trivial clients, such as data exploration and analysis environments, digital libraries must be able to describe the access modes that their contents support. We pre...
Greg Janee, James Frew, David Valentine
HICSS
2012
IEEE
260views Biometrics» more  HICSS 2012»
12 years 3 months ago
Effort Estimates for Vulnerability Discovery Projects
Security vulnerabilities continue to be an issue in the software field and new severe vulnerabilities are discovered in software products each month. This paper analyzes estimates...
Teodor Sommestad, Hannes Holm, Mathias Ekstedt
TPHOL
2009
IEEE
14 years 2 months ago
Trace-Based Coinductive Operational Semantics for While
We present four coinductive operational semantics for the While language accounting for both terminating and non-terminating program runs: big-step and small-step relational semant...
Keiko Nakata, Tarmo Uustalu
PSTV
1992
113views Hardware» more  PSTV 1992»
13 years 8 months ago
Coverage Preserving Reduction Strategies for Reachability Analysis
We study the effect of three new reduction strategies for conventional reachability analysis, as used in automated protocol validation algorithms. The first two strategies are imp...
Gerard J. Holzmann, Patrice Godefroid, Didier Piro...
ACCV
1998
Springer
13 years 11 months ago
Tracking a Person with Pre-recorded Image Database and a Pan, Tilt, and Zoom Camera
This paper proposes a novel tracking strategy that can robustly track a person or other object within a fixed environment using a pan, tilt, and zoom camera with the help of a pre...
Yiming Ye, John K. Tsotsos, Karen Bennet, Eric Har...