Sciweavers

2205 search results - page 207 / 441
» Mutation Operators for Specifications
Sort
View
137
Voted
EUROIMSA
2006
177views Multimedia» more  EUROIMSA 2006»
15 years 4 months ago
Automatic Sports Video Analysis using Audio Clues and Context Knowledge
Sports analysis has recently become popular in research and professional applications. This paper presents a scheme for automatic sports video analysis based on audio clues and sp...
Weilun Lao, Jungong Han, Peter H. N. de With
SEC
2004
15 years 4 months ago
An Asymmetric Cryptography Secure Channel Protocol for Smart Cards
: Smart card secure channel protocols based on public key cryptography are not widely utilised mainly due to processing overheads introduced in the underlying smart card microproce...
Konstantinos Rantos, Constantinos Markantonakis
123
Voted
AAAI
1996
15 years 3 months ago
The ContactFinder Agent: Answering Bulletin Board Questions with Referrals
ContactFinder is an intelligent agent whose approach to assisting users is valuable and innovative in the following four ways. First, ContactFinder operates proactively in reading...
Bruce Krulwich, Chad Burkey
125
Voted
ATVA
2009
Springer
97views Hardware» more  ATVA 2009»
15 years 3 months ago
Memory Usage Verification Using Hip/Sleek
Embedded systems often come with constrained memory footprints. It is therefore essential to ensure that software running on such platforms fulfils memory usage specifications at c...
Guanhua He, Shengchao Qin, Chenguang Luo, Wei-Ngan...
132
Voted
CIDR
2009
152views Algorithms» more  CIDR 2009»
15 years 3 months ago
Visualizing the robustness of query execution
In database query processing, actual run-time conditions (e.g., actual selectivities and actual available memory) very often differ from compile-time expectations of run-time cond...
Goetz Graefe, Harumi A. Kuno, Janet L. Wiener