Sciweavers

2400 search results - page 453 / 480
» Systems Failures
Sort
View
SIGSOFT
2007
ACM
14 years 9 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
GECCO
2003
Springer
137views Optimization» more  GECCO 2003»
14 years 2 months ago
The Spatially-Dispersed Genetic Algorithm
Abstract. Spatially structured population models improve the performance of genetic algorithms by assisting the selection scheme in maintaining diversity. A significant concern wi...
Grant Dick
CVPR
1998
IEEE
14 years 10 months ago
Integrated Person Tracking Using Stereo, Color, and Pattern Detection
We present an approach to real-time person tracking in crowded and/or unknown environments using multi-modal integration. We combine stereo, color, and face detection modules into...
Trevor Darrell, Gaile G. Gordon, Michael Harville,...
CVPR
2007
IEEE
14 years 10 months ago
Recognizing Groceries in situ Using in vitro Training Data
The problem of using pictures of objects captured under ideal imaging conditions (here referred to as in vitro) to recognize objects in natural environments (in situ) is an emergi...
Michele Merler, Carolina Galleguillos, Serge Belon...
ICSE
2008
IEEE-ACM
14 years 9 months ago
A study of student strategies for the corrective maintenance of concurrent software
Graduates of computer science degree programs are increasingly being asked to maintain large, multi-threaded software systems; however, the maintenance of such systems is typicall...
Scott D. Fleming, Eileen Kraemer, R. E. Kurt Stire...