Sciweavers

1587 search results - page 80 / 318
» What's my method
Sort
View
IAW
2003
IEEE
14 years 3 months ago
Static Verification of Worm and virus Behavior in binary Executables using Model Checking
- Use offormal methods in any application scenario requires a precise characterization and representation of the properties that need to be verified The target, which is desired ri...
Prabhat K. Singh, Arun Lakhotia
ESEM
2009
ACM
14 years 2 months ago
A systematic mapping study on empirical evaluation of software requirements specifications techniques
This paper describes an empirical mapping study, which was designed to identify what aspects of Software Requirement Specifications (SRS) are empirically evaluated, in which conte...
Nelly Condori-Fernández, Maya Daneva, Klaas...
ACL
2003
13 years 11 months ago
Automatic Error Detection in the Japanese Learners' English Spoken Data
This paper describes a method of detecting grammatical and lexical errors made by Japanese learners of English and other techniques that improve the accuracy of error detection wi...
Emi Izumi, Kiyotaka Uchimoto, Toyomi Saiga, Thepch...
EUSFLAT
2001
13 years 11 months ago
Fuzzy robustness analysis
This paper proposes a confluence between soft OR and soft computing methods, by means of an application of fuzzy logic ideas to robustness analysis. Both methods try to add flexib...
Luiz Fernando Loureiro Legey, Heloisa Firmo Kazay
FTCGV
2007
104views more  FTCGV 2007»
13 years 10 months ago
Local Invariant Feature Detectors: A Survey
In this survey, we give an overview of invariant interest point detectors, how they evolved over time, how they work, and what their respective strengths and weaknesses are. We be...
Tinne Tuytelaars, Krystian Mikolajczyk