Sciweavers

410 search results - page 76 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
CORR
2010
Springer
149views Education» more  CORR 2010»
13 years 7 months ago
Group Testing with Probabilistic Tests: Theory, Design and Application
Identification of defective members of large populations has been widely studied in the statistics community under the name of group testing. It involves grouping subsets of items...
Mahdi Cheraghchi, Ali Hormati, Amin Karbasi, Marti...
ICDE
2008
IEEE
195views Database» more  ICDE 2008»
14 years 9 months ago
Scalable Rule-Based Gene Expression Data Classification
Abstract-- Current state-of-the-art association rule-based classifiers for gene expression data operate in two phases: (i) Association rule mining from training data followed by (i...
Mark A. Iwen, Willis Lang, Jignesh M. Patel
EMSOFT
2004
Springer
14 years 1 months ago
Remote customization of systems code for embedded devices
Dedicated operating systems for embedded systems are fast being phased out due to their use of manual optimization, which provides high performance and small footprint, but also r...
Sapan Bhatia, Charles Consel, Calton Pu
CIVR
2007
Springer
254views Image Analysis» more  CIVR 2007»
13 years 11 months ago
Soccer players identification based on visual local features
Semantic detection and recognition of objects and events contained in a video stream has to be performed in order to provide content-based annotation and retrieval of videos. This...
Lamberto Ballan, Marco Bertini, Alberto Del Bimbo,...
DAC
2003
ACM
14 years 8 months ago
Automated synthesis of efficient binary decoders for retargetable software toolkits
A binary decoder is a common component of software development tools such as instruction set simulators, disassemblers and debuggers. The efficiency of the decoder can have a sign...
Wei Qin, Sharad Malik