Sciweavers

374 search results - page 58 / 75
» Internalization, qualitative methods, and evaluation
Sort
View
SIGSOFT
2005
ACM
14 years 8 months ago
Permissive interfaces
A modular program analysis considers components independently and provides succinct summaries for each component, which can be used when checking the rest of the system. Consider ...
Thomas A. Henzinger, Ranjit Jhala, Rupak Majumdar
MASCOTS
2003
13 years 9 months ago
Bottleneck Estimation for Load Control Gateways
Providing Quality of Service (QoS) to inelastic data transmissions in a cost-efficient, highly scalable, and realistic fashion in IP networks remains a challenging research issue....
Krishna Pandit, Jens Schmitt, Martin Karsten, Ralf...
CVPR
2007
IEEE
14 years 9 months ago
Real-time Automatic Deceit Detection from Involuntary Facial Expressions
Being the most broadly used tool for deceit measurement, the polygraph is a limited method as it suffers from human operator subjectivity and the fact that target subjects are awa...
Zhi Zhang, Vartika Singh, Thomas E. Slowe, Sergey ...
ICPR
2000
IEEE
14 years 8 months ago
Comparison of Face Verification Results on the XM2VTS Database
The paper presents results of the face verification contest that was organized in conjunction with International Conference on Pattern Recognition 2000 [14]. Participants had to u...
Jiri Matas, Miroslav Hamouz, Kenneth Jonsson, Jose...
IPMI
2007
Springer
14 years 8 months ago
A Shape-Guided Deformable Model with Evolutionary Algorithm Initialization for 3D Soft Tissue Segmentation
Abstract. We present a novel method for the segmentation of volumetric images, which is especially suitable for highly variable soft tissue structures. Core of the algorithm is a s...
Hans-Peter Meinzer, Ivo Wolf, Sascha Münzing,...