Sciweavers

5962 search results - page 11 / 1193
» Working with Patterns and Code
Sort
View
KBSE
2009
IEEE
14 years 2 months ago
Alattin: Mining Alternative Patterns for Detecting Neglected Conditions
—To improve software quality, static or dynamic verification tools accept programming rules as input and detect their violations in software as defects. As these programming rul...
Suresh Thummalapenta, Tao Xie
SIBGRAPI
2007
IEEE
14 years 1 months ago
Dental Biometrics: Human Identification Based On Dental Work Information
Dental biometrics is used in forensic dentistry to identify or verify persons based on their dental radiographs. This paper presents a method for human identification based on den...
Michael Hofer, Aparecido Nilceu Marana
PAMI
2006
135views more  PAMI 2006»
13 years 7 months ago
Real-Time Range Acquisition by Adaptive Structured Light
The goal of this paper is to provide a "self-adaptive" system for real-time range acquisition. Reconstructions are based on a single frame structured light illumination. ...
Thomas P. Koninckx, Luc J. Van Gool
HICSS
2000
IEEE
110views Biometrics» more  HICSS 2000»
13 years 11 months ago
Reverse Compilation for Digital Signal Processors: A Working Example
We describe the implementation and use of a reverse compiler from Analog Devices 21xx assembler source to ANSI-C with optional use of the language extensions for the TMS320C6x pr...
Adrian Johnstone, Elizabeth Scott, Tim Womack
ADHOCNOW
2005
Springer
14 years 27 days ago
Reed-Solomon and Hermitian Code-Based Scheduling Protocols for Wireless Ad Hoc Networks
Abstract. In this work we investigate bounds on throughput and delay performance of a scheduling protocol that derives its decisions from codes traditionally used to correct or det...
Carlos H. Rentel, Thomas Kunz