Sciweavers

477 search results - page 64 / 96
» Removing even crossings
Sort
View
ESEM
2009
ACM
13 years 11 months ago
Test coverage and post-verification defects: A multiple case study
Test coverage is a promising measure of test effectiveness and development organizations are interested in costeffective levels of coverage that provide sufficient fault removal w...
Audris Mockus, Nachiappan Nagappan, Trung T. Dinh-...
FORMATS
2009
Springer
13 years 11 months ago
Safe Runtime Verification of Real-Time Properties
Abstract. Introducing a monitor on a system typically changes the system's behaviour by slowing the system down and increasing memory consumption. This may possibly result in ...
Christian Colombo, Gordon J. Pace, Gerardo Schneid...
ACIVS
2006
Springer
13 years 11 months ago
Constrained Region-Growing and Edge Enhancement Towards Automated Semantic Video Object Segmentation
Most existing object segmentation algorithms suffer from a so-called under-segmentation problem, where parts of the segmented object are missing and holes often occur inside the ob...
L. Gao, J. Jiang, S. Y. Yang
AINA
2006
IEEE
13 years 11 months ago
EC: an edge-based architecture against DDoS attacks and malware spread
The ability to limit unsolicited traffic in the Internet is important to defy DDoS attacks and to contain the spread of worms and viruses. The concept of capabilities, which requir...
Roger Karrer
ECCV
2006
Springer
13 years 11 months ago
Wavelet-Based Super-Resolution Reconstruction: Theory and Algorithm
We present an analysis and algorithm for the problem of super-resolution imaging, that is the reconstruction of HR (high-resolution) images from a sequence of LR (lowresolution) im...
Hui Ji, Cornelia Fermüller