Sciweavers

5128 search results - page 102 / 1026
» When Abstraction Fails
Sort
View
ACSAC
1999
IEEE
15 years 8 months ago
Using Abuse Case Models for Security Requirements Analysis
The relationships between the work products of a security engineering process can be hard to understand, even for persons with a strong technical background but little knowledge o...
John P. McDermott, Chris Fox
ICDAR
1999
IEEE
15 years 8 months ago
Binarization of Document Images using Hadamard Multiresolution Analysis
In this article, we propose a new method that combines the use of a global threshold and a window-based scheme for computing local thresholds. The latter scheme compares the contr...
Fu Chang, Kung-Hao Liang, Tzu-Ming Tan, Wen-Liang ...
140
Voted
PG
1999
IEEE
15 years 8 months ago
Subdivision Surface Fitting to a Range of Points
The objective of this research is to apply the subdivision surface for surface fitting problems when generating surfaces from data points or polyhedral models. The basic idea is t...
Hiromasa Suzuki, Shingo Takeuchi, Fumihiko Kimura,...
123
Voted
VTS
1999
IEEE
114views Hardware» more  VTS 1999»
15 years 8 months ago
Partial Scan Using Multi-Hop State Reachability Analysis
Sequential test generators fail to yield tests for some stuck-at-faults because they are unable to reach certain states necessary for exciting propagating these target faults. Add...
Sameer Sharma, Michael S. Hsiao
MICCAI
1999
Springer
15 years 8 months ago
Understanding the "Demon's Algorithm": 3D Non-rigid Registration by Gradient Descent
The “Demons Algorithm” in increasingly used for non-rigid registration of 3D medical images. However, if it is fast and usually accurate, the algorithm is based on intuitive id...
Xavier Pennec, Pascal Cachier, Nicholas Ayache