Sciweavers

641 search results - page 8 / 129
» Identifying Contingency Requirements Using Obstacle Analysis
Sort
View
APSEC
2003
IEEE
14 years 24 days ago
Understanding How the Requirements Are Implemented in Source Code
For software maintenance and evolution, a common problem is to understand how each requirement is implemented in the source code. The basic solution of this problem is to find the...
Wei Zhao, Lu Zhang, Yin Liu, Jing Luo, Jiasu Sun
ETFA
2005
IEEE
14 years 1 months ago
A multi-robot system for landmine detection
This paper describes the development of a multi-robot system for Area Reduction in Humanitarian Demining. In spite of the specific requirements imposed to the work being carried ...
Pedro Santana, José Barata, H. Cruz, A. Mes...
DAGM
2006
Springer
13 years 11 months ago
Robust MEG Source Localization of Event Related Potentials: Identifying Relevant Sources by Non-Gaussianity
Independent Component Analysis (ICA) is a frequently used preprocessing step in source localization of MEG and EEG data. By decomposing the measured data into maximally independent...
Peter Breun, Moritz Grosse-Wentrup, Wolfgang Utsch...
BIOCOMP
2008
13 years 9 months ago
Identifying Protein Flexibility by NMA
- Here proposed apriori method for identification of protein flexibility relies on one end-state conformation of the protein. This method has comparative advantage over many others...
Kresimir Sikic, Branko Jeren, Sanja Tomic
DGO
2007
152views Education» more  DGO 2007»
13 years 9 months ago
Identifying and classifying subjective claims
To understand the subjective documents, for example, public comments on the government’s proposed regulation, opinion identification and classification is required. Rather than ...
Namhee Kwon, Liang Zhou, Eduard H. Hovy, Stuart W....