Sciweavers

410 search results - page 64 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
DCC
2004
IEEE
14 years 8 months ago
Coding for Fast Access to Image Regions Defined by Pixel Range
Many technical imaging applications, like coding "images" of digital elevation maps, require extracting regions of compressed images in which the pixel values are within...
Amir Said, Sehoon Yea, William A. Pearlman
AGENTS
1997
Springer
14 years 1 months ago
A Scalable Comparison-Shopping Agent for the World-Wide Web
The World-Wide-Web is less agent-friendly than we might hope. Most information on the Web is presented in loosely structured natural language text with no agent-readable semantics...
Robert B. Doorenbos, Oren Etzioni, Daniel S. Weld
ISBI
2007
IEEE
14 years 3 months ago
Pib-Pet Segmentation for Automatic Suvr Normalisation without Mr Information
Pittsburg Compound B (PIB) is a Positron Emission Tomography (PET) radio tracer used to image in-vivo, beta amyloid plaques which are one of the major histopathological hallmarks ...
Parnesh Raniga, Pierrick Bourgeat, Sébastie...
DATE
2003
IEEE
128views Hardware» more  DATE 2003»
14 years 2 months ago
Flexible and Formal Modeling of Microprocessors with Application to Retargetable Simulation
Given the growth in application-specific processors, there is a strong need for a retargetable modeling framework that is capable of accurately capturing complex processor behavi...
Wei Qin, Sharad Malik
TSE
2010
125views more  TSE 2010»
13 years 7 months ago
Engineering a Sound Assertion Semantics for the Verifying Compiler
—The Verifying Compiler (VC) project is a core component of the Dependable Systems Evolution Grand Challenge. The VC offers the promise of automatically proving that a program or...
Patrice Chalin