Sciweavers

6800 search results - page 1160 / 1360
» Testing with Functions as Specifications
Sort
View
JEI
2010
120views more  JEI 2010»
13 years 6 months ago
Performance evaluation of mail-scanning cameras
Letter scanning cameras (LSCs) form the front end imaging systems for virtually all mail scanning systems that are currently used to automatically sort mail products. As with any ...
Umesh Rajashekar, Tony Tuan Vu, John E. Hooning, A...
MIAR
2010
IEEE
13 years 6 months ago
Manifold Learning for Image-Based Gating of Intravascular Ultrasound(IVUS) Pullback Sequences
Intravascular Ultrasound(IVUS) is an imaging technology which provides cross-sectional images of internal coronary vessel structures. The IVUS frames are acquired by pulling the ca...
Gozde Gul Isguder, Gözde B. Ünal, Martin...
MP
2010
135views more  MP 2010»
13 years 6 months ago
An inexact Newton method for nonconvex equality constrained optimization
Abstract We present a matrix-free line search algorithm for large-scale equality constrained optimization that allows for inexact step computations. For sufficiently convex problem...
Richard H. Byrd, Frank E. Curtis, Jorge Nocedal
NOMS
2010
IEEE
251views Communications» more  NOMS 2010»
13 years 6 months ago
Online detection of utility cloud anomalies using metric distributions
—The online detection of anomalies is a vital element of operations in data centers and in utility clouds like Amazon EC2. Given ever-increasing data center sizes coupled with th...
Chengwei Wang, Vanish Talwar, Karsten Schwan, Part...
RAID
2010
Springer
13 years 6 months ago
Automatic Discovery of Parasitic Malware
Malicious software includes functionality designed to block discovery or analysis by defensive utilities. To prevent correct attribution of undesirable behaviors to the malware, it...
Abhinav Srivastava, Jonathon T. Giffin
« Prev « First page 1160 / 1360 Last » Next »