Sciweavers

2874 search results - page 530 / 575
» Intrusion Detection: Systems and Models
Sort
View
ICCV
1999
IEEE
14 years 12 months ago
Object Recognition from Local Scale-Invariant Features
Proc. of the International Conference on Computer Vision, Corfu (Sept. 1999) An object recognition system has been developed that uses a new class of local image features. The fea...
David G. Lowe
ICIP
2009
IEEE
14 years 11 months ago
Facial Marks: Soft Biometric For Face Recognition
We propose to utilize micro features, namely facial marks (e.g., freckles, moles, and scars) to improve face recognition and retrieval performance. Facial marks can be used in thr...
ICSE
2008
IEEE-ACM
14 years 10 months ago
Analyzing medical processes
This paper shows how software engineering technologies used to define and analyze complex software systems can also be effective in detecting defects in human-intensive processes ...
Bin Chen, George S. Avrunin, Elizabeth A. Henneman...
ICSE
2008
IEEE-ACM
14 years 10 months ago
jPredictor: a predictive runtime analysis tool for java
JPREDICTOR is a tool for detecting concurrency errors in JAVA programs. The JAVA program is instrumented to emit property-relevant events at runtime and then executed. The resulti...
Feng Chen, Traian-Florin Serbanuta, Grigore Rosu
ICSE
2008
IEEE-ACM
14 years 10 months ago
Automatic modularity conformance checking
According to Parnas's information hiding principle and Baldwin and Clark's design rule theory, the key step to decomposing a system into modules is to determine the desi...
Sunny Huynh, Yuanfang Cai, Yuanyuan Song, Kevin J....