Sciweavers

2763 search results - page 59 / 553
» The Dangerous 'All' in Specifications
Sort
View
ICPR
2002
IEEE
14 years 10 months ago
Content Based Image Retrieval Using Optimum Peano Scan
We present a new technique for content based image retrieval where feature vector to be matched is very much specific to the query image. A particular Peano scan which is optimal ...
N. Jhanwar, Subhasis Chaudhuri, Guna Seetharaman, ...
ESORICS
2002
Springer
14 years 8 months ago
Confidentiality-Preserving Refinement is Compositional - Sometimes
Confidentiality-preserving refinement describes a relation between a specification and an implementation that ensures that all confidentiality properties required in the specificat...
Thomas Santen, Maritta Heisel, Andreas Pfitzmann
ATAL
2004
Springer
14 years 2 months ago
The Insufficiency of Formal Design Methods - The Necessity of an Experimental Approach - for the Understanding and Control of Co
We highlight the limitations of formal methods by exhibiting two results in recursive function theory: that there is no effective means of finding a program that satisfies a given...
Bruce Edmonds, Joanna Bryson
VL
1999
IEEE
120views Visual Languages» more  VL 1999»
14 years 1 months ago
Formalizing Spider Diagrams
Geared to complement UML and to the specification of large software systems by non-mathematicians, spider diagrams are a visual language that generalizes the popular and intuitive...
Joseph Gil, John Howse, Stuart Kent
CIARP
2008
Springer
13 years 11 months ago
Pattern Recognition Methods for Querying and Browsing Technical Documentation
Abstract. Graphics recognition deals with the specific pattern recognition problems found in graphics-rich documents, typical technical documentation of all kinds. In this paper, w...
Karl Tombre, Bart Lamiroy