Sciweavers

376 search results - page 52 / 76
» Systems Failures: An Approach to Building a Coping Strategy
Sort
View
ICSE
2007
IEEE-ACM
14 years 1 months ago
Migration of Legacy Assets to Service-Oriented Architecture Environments
This tutorial addresses the problem of the migration of legacy assets to Service-Oriented Architecture (SOA) environments. It addresses how to develop a realistic strategy for per...
Dennis B. Smith
PAMI
2012
11 years 10 months ago
Tracking-Learning-Detection
A novel system for long-term tracking of a human face in unconstrained videos is built on Tracking-Learning-Detection (TLD) approach. The system extends TLD with the concept of a ...
Zdenek Kalal, Krystian Mikolajczyk, Jiri Matas
SCS
2004
13 years 9 months ago
Contract-Based Justification for COTS Component within Safety Critical Applications
Commercial-Off-The-Shelf (COTS) software components are being used within complex safety-critical applications. However, to use them with confidence, it is necessary to ensure tha...
Fan Ye, Tim Kelly
CVPR
2007
IEEE
14 years 2 months ago
Surveillance in Virtual Reality: System Design and Multi-Camera Control
This paper advocates a Virtual Vision paradigm and demonstrates its usefulness in camera sensor network research. Virtual vision prescribes the use of a visually and behaviorally ...
Faisal Qureshi, Demetri Terzopoulos
CAV
2009
Springer
206views Hardware» more  CAV 2009»
14 years 8 months ago
D-Finder: A Tool for Compositional Deadlock Detection and Verification
D-Finder tool implements a compositional method for the verification of component-based systems described in BIP language encompassing multi-party interaction. For deadlock detecti...
Saddek Bensalem, Marius Bozga, Thanh-Hung Nguyen, ...