Sciweavers

3595 search results - page 642 / 719
» Roles of Program Extension
Sort
View
TPHOL
1999
IEEE
14 years 2 months ago
Three Tactic Theorem Proving
Abstract. We describe the key features of the proof description language of Declare, an experimental theorem prover for higher order logic. We take a somewhat radical approach to p...
Don Syme
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
14 years 2 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
ECBS
1996
IEEE
93views Hardware» more  ECBS 1996»
14 years 2 months ago
A Methodology for Designing and Dimensioning Critical Complex Computing Systems
It is widely recognized that real-time,fault-tolerant and distributed computing technologies play a key role in the deployment of many current andfuture (civilian or Defense) crit...
Gérard Le Lann
DILS
2009
Springer
14 years 2 months ago
A Visual Interface for on-the-fly Biological Database Integration and Workflow Design Using VizBuilder
Abstract. Data integration plays a major role in modern Life Sciences research primarily because required resources are geographically distributed across continents and experts dep...
Shahriyar Hossain, Hasan M. Jamil
CLEAR
2006
Springer
145views Biometrics» more  CLEAR 2006»
14 years 1 months ago
A Joint System for Single-Person 2D-Face and 3D-Head Tracking in CHIL Seminars
We present the IBM systems submitted and evaluated within the CLEAR'06 evaluation campaign for the tasks of single person visual 3D tracking (localization) and 2D face trackin...
Gerasimos Potamianos, ZhenQiu Zhang