Sciweavers

955 search results - page 176 / 191
» Model Checking Operator Procedures
Sort
View
PRL
2007
287views more  PRL 2007»
13 years 10 months ago
2D and 3D face recognition: A survey
Government agencies are investing a considerable amount of resources into improving security systems as result of recent terrorist events that dangerously exposed flaws and weakn...
Andrea F. Abate, Michele Nappi, Daniel Riccio, Gab...
IPCAI
2010
13 years 8 months ago
First Animal Cadaver Study for Interlocking of Intramedullary Nails under Camera Augmented Mobile C-arm
The Camera Augmented Mobile C-arm (CamC) system that augments a regular mobile C-arm by a video camera provides an overlay image of X-ray and video. This technology is expected to ...
Lejing Wang, Jürgen Landes, Simon Weidert, To...
TIP
2008
153views more  TIP 2008»
13 years 10 months ago
Generalized Flooding and Multicue PDE-Based Image Segmentation
Image segmentation remains an important, but hard-to-solve, problem since it appears to be application dependent with usually no a priori information available regarding the image ...
Anastasia Sofou, Petros Maragos
WCRE
2003
IEEE
14 years 4 months ago
GUI Ripping: Reverse Engineering of Graphical User Interfaces for Testing
Graphical user interfaces (GUIs) are important parts of today’s software and their correct execution is required to ensure the correctness of the overall software. A popular tec...
Atif M. Memon, Ishan Banerjee, Adithya Nagarajan
FORMATS
2007
Springer
14 years 2 months ago
Combining Formal Verification with Observed System Execution Behavior to Tune System Parameters
Resource limited DRE (Distributed Real-time Embedded) systems can benefit greatly from dynamic adaptation of system parameters. We propose a novel approach that employs iterative t...
Minyoung Kim, Mark-Oliver Stehr, Carolyn L. Talcot...