Sciweavers

180 search results - page 29 / 36
» How Thorough Is Thorough Enough
Sort
View
SCS
2004
13 years 9 months ago
The HEAT/ACT Preliminary Safety Case: A case study in the use of Goal Structuring Notation
The HEAT/ACT project consists of replacing the conventional mechanical flight control system of a helicopter with a fly-by-wire system. With such a project, the safety concerns ar...
Paul Chinneck, David Pumfrey, John McDermid
ASE
2006
110views more  ASE 2006»
13 years 8 months ago
Runtime recovery and manipulation of software architecture of component-based systems
Recently, more attention is paid to the researches and practices on how to use software architecture in software maintenance and evolution to reduce their complexity and cost. The ...
Gang Huang, Hong Mei, Fuqing Yang
JMM2
2006
146views more  JMM2 2006»
13 years 8 months ago
Probabilistic Algorithms, Integration, and Empirical Evaluation for Disambiguating Multiple Selections in Frustum-Based Pointing
There are a few fundamental pointing-based user interface techniques for performing selections in 3D environments. One of these techniques is ray pointing, which makes selections b...
Greg S. Schmidt, Dennis G. Brown, Erik B. Tomlin, ...
INFOCOM
2010
IEEE
13 years 7 months ago
A Signal Processing View on Packet Sampling and Anomaly Detection
—Anomaly detection methods typically operate on pre-processed, i.e., sampled and aggregated, traffic traces. Most traffic capturing devices today employ random packet sampling,...
Daniela Brauckhoff, Kavé Salamatian, Martin...
ICCV
2009
IEEE
1419views Computer Vision» more  ICCV 2009»
15 years 1 months ago
On Feature Combination for Multiclass Object Classification
A key ingredient in the design of visual object classification systems is the identification of relevant class specific aspects while being robust to intra-class variations. Whil...
Peter Gehler, Sebastian Nowozin