Sciweavers

286 search results - page 16 / 58
» Playing the Minesweeper with Constraints
Sort
View
ICASSP
2011
IEEE
12 years 11 months ago
Detecting human activities in retail surveillance using hierarchical finite state machine
Cashiers in retail stores usually exhibit certain repetitive and periodic activities when processing items. Detecting such activities plays a key role in most retail fraud detecti...
Hoang Trinh, Quanfu Fan, Jiyan Pan, Prasad Gabbur,...
AVSS
2006
IEEE
14 years 1 months ago
Dissecting the Image of the Absolute Conic
In this paper, we revisit the role of the image of the absolute conic (IAC) in recovering the camera geometry. We derive new constraints on IAC that advance our understanding of i...
Imran N. Junejo, Hassan Foroosh
ICSE
2003
IEEE-ACM
14 years 7 months ago
Problems and Programmers: An Educational Software Engineering Card Game
Problems and Programmers is an educational card game that we have developed to help teach software engineering. It is based on the observation that students, in a typical software...
Alex Baker, Emily Oh Navarro, André van der...
CP
1998
Springer
13 years 11 months ago
Error-Correcting Source Code
We study how constraint-based static analysis can be applied to the automated and systematic debugging of program errors. Strongly moding and constraint-based mode analysis are tur...
Yasuhiro Ajiro, Kazunori Ueda, Kenta Cho
CAV
2010
Springer
239views Hardware» more  CAV 2010»
13 years 9 months ago
Universal Causality Graphs: A Precise Happens-Before Model for Detecting Bugs in Concurrent Programs
Triggering errors in concurrent programs is a notoriously difficult task. A key reason for this is the behavioral complexity resulting from the large number of interleavings of op...
Vineet Kahlon, Chao Wang