Sciweavers

927 search results - page 162 / 186
» Practical Limits on Software Dependability: A Case Study
Sort
View
INFSOF
2010
173views more  INFSOF 2010»
13 years 4 months ago
Filtering false alarms of buffer overflow analysis using SMT solvers
Buffer overflow detection using static analysis can provide a powerful tool for software ers to find difficult bugs in C programs. Sound static analysis based on abstract interpre...
Youil Kim, Jooyong Lee, Hwansoo Han, Kwang-Moo Cho...
IADIS
2003
13 years 9 months ago
Scalability of Cooperative Algorithms for Distributed Architectures of Proxy Servers
Systems consisting of multiple proxy servers are a popular solution to deal with performance and network resource utilization problems related to the growth of the Web numbers. Af...
Riccardo Lancellotti, Francesca Mazzoni, Michele C...
JISE
2008
77views more  JISE 2008»
13 years 7 months ago
Formalized Entity Extraction Methodology for Changeable Business Requirements
business requirement in the real world cannot be abstracted correctly into an entity-relationship schema. Once core entities are discovered, we can obtain an Entity-Relationship Di...
Namgyu Kim, Sangwon Lee, Songchun Moon
CAISE
2006
Springer
13 years 11 months ago
Loosely-Coupled Process Automation in Medical Environments
Abstract. We discuss a case study for the hospital scenario where workflow model components are distributed across various computers or devices (e.g. mobile phones, PDAs, sensors, ...
Jurate Vysniauskaite
PAMI
2010
265views more  PAMI 2010»
13 years 6 months ago
Motion Segmentation in the Presence of Outlying, Incomplete, or Corrupted Trajectories
—In this paper, we study the problem of segmenting tracked feature point trajectories of multiple moving objects in an image sequence. Using the affine camera model, this proble...
Shankar Rao, Roberto Tron, René Vidal, Yi M...