Sciweavers

1056 search results - page 33 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
AAMAS
2007
Springer
13 years 7 months ago
Mechanisms for environments in multi-agent systems: Survey and opportunities
The environment has been recognized as an explicit and exploitable element to design Multi-Agent Systems (MAS). It can be assigned a number of responsibilities that would be more d...
Eric Platon, Marco Mamei, Nicolas Sabouret, Shinic...
DRR
2009
13 years 5 months ago
Figure content analysis for improved biomedical article retrieval
Biomedical images are invaluable in medical education and establishing clinical diagnosis. Clinical decision support (CDS) can be improved by combining biomedical text with automa...
Daekeun You, Emilia Apostolova, Sameer Antani, Din...
FASE
2010
Springer
14 years 2 months ago
Memory Leaks Detection in Java by Bi-abductive Inference
This paper describes a compositional analysis algorithm for statically detecting leaks in Java programs. The algorithm is based on separation logic and exploits the concept of bi-a...
Dino Distefano, Ivana Filipovic
JCS
2002
94views more  JCS 2002»
13 years 7 months ago
Model-Based Analysis of Configuration Vulnerabilities
Vulnerability analysis is concerned with the problem of identifying weaknesses in computer systems that can be exploited to compromise their security. In this paper we describe a ...
C. R. Ramakrishnan, R. C. Sekar
PAMI
1998
77views more  PAMI 1998»
13 years 7 months ago
The Vector-Gradient Hough Transform
—The paper presents a new transform, called Vector– Gradient Hough Transform, for identifying elongated shapes in grayscale images. This goal is achieved not only by collecting...
Rita Cucchiara, Fabio Filicori