Sciweavers

526 search results - page 93 / 106
» Representations of structural closure operators
Sort
View
ECOOPW
1998
Springer
14 years 1 months ago
Mapping Business Processes to Software Design Artifacts
This paper explains the structure of a project repository, which enables you to trace business processes and business rules to the architecture and design of the software system. T...
Pavel Hruby
BMCBI
2008
138views more  BMCBI 2008»
13 years 9 months ago
Application of nonnegative matrix factorization to improve profile-profile alignment features for fold recognition and remote ho
Background: Nonnegative matrix factorization (NMF) is a feature extraction method that has the property of intuitive part-based representation of the original features. This uniqu...
Inkyung Jung, Jaehyung Lee, Soo-Young Lee, Dongsup...
TVCG
2008
173views more  TVCG 2008»
13 years 9 months ago
Sinus Endoscopy - Application of Advanced GPU Volume Rendering for Virtual Endoscopy
For difficult cases in endoscopic sinus surgery, a careful planning of the intervention is necessary. Due to the reduced field of view during the intervention, the surgeons have le...
Arno Krüger, Christoph Kubisch, Gero Strau&sz...
SIGSOFT
2003
ACM
14 years 10 months ago
Tracking pointers with path and context sensitivity for bug detection in C programs
This paper proposes a pointer alias analysis for automatic error detection. State-of-the-art pointer alias analyses are either too slow or too imprecise for finding errors in real...
V. Benjamin Livshits, Monica S. Lam
CCS
2009
ACM
14 years 10 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong