Sciweavers

1626 search results - page 239 / 326
» The method evaluation model: a theoretical model for validat...
Sort
View
ATVA
2007
Springer
136views Hardware» more  ATVA 2007»
14 years 2 months ago
Symbolic Fault Tree Analysis for Reactive Systems
Fault tree analysis is a traditional and well-established technique for analyzing system design and robustness. Its purpose is to identify sets of basic events, called cut sets, wh...
Marco Bozzano, Alessandro Cimatti, Francesco Tappa...
PAMI
1998
141views more  PAMI 1998»
13 years 7 months ago
A Probabilistic Approach to the Coupled Reconstruction and Restoration of Underwater Acoustic Images
—This paper describes a probabilistic technique for the coupled reconstruction and restoration of underwater acoustic images. The technique is founded on the physics of the image...
Vittorio Murino, Andrea Trucco, Carlo S. Regazzoni
TSE
2002
99views more  TSE 2002»
13 years 7 months ago
Recovering Traceability Links between Code and Documentation
Software system documentation is almost always expressed informally in natural language and free text. Examples include requirement specifications, design documents, manual pages, ...
Giuliano Antoniol, Gerardo Canfora, Gerardo Casazz...
KDD
2012
ACM
205views Data Mining» more  KDD 2012»
11 years 10 months ago
Rank-loss support instance machines for MIML instance annotation
Multi-instance multi-label learning (MIML) is a framework for supervised classification where the objects to be classified are bags of instances associated with multiple labels....
Forrest Briggs, Xiaoli Z. Fern, Raviv Raich
DGO
2007
97views Education» more  DGO 2007»
13 years 9 months ago
Interactive exploration and discovery of e-government services
Government e-services available to citizens represent one of the most frequent and critical points of contact between public administrations and citizens. In addition to common se...
Giovanni Maria Sacco