Sciweavers

1770 search results - page 230 / 354
» Writing requirements in computer security
Sort
View
MICCAI
2008
Springer
14 years 11 months ago
A Novel Explicit 2D+t Cyclic Shape Model Applied to Echocardiography
In this paper, we propose a novel explicit 2D+t cyclic shape model that extends the Point Distribution Model (PDM) to shapes like myocardial contours with cyclic dynamics. We also ...
Ramón Casero, J. Alison Noble
POPL
2006
ACM
14 years 10 months ago
Engineering with logic: HOL specification and symbolic-evaluation testing for TCP implementations
The TCP/IP protocols and Sockets API underlie much of modern computation, but their semantics have historically been very complex and ill-defined. The real standard is the de fact...
Steve Bishop, Matthew Fairbairn, Michael Norrish, ...
EGH
2004
Springer
14 years 3 months ago
Mio: fast multipass partitioning via priority-based instruction scheduling
Real-time graphics hardware continues to offer improved resources for programmable vertex and fragment shaders. However, shader programmers continue to write shaders that require ...
Andrew Riffel, Aaron E. Lefohn, Kiril Vidimce, Mar...
GRID
2004
Springer
14 years 3 months ago
Parallel and Distributed Astronomical Data Analysis on Grid Datafarm
A comprehensive study of the whole petabyte-scale archival data of astronomical observatories has a possibility of new science and new knowledge in the field, while it was not fe...
Naotaka Yamamoto, Osamu Tatebe, Satoshi Sekiguchi
BMVC
2010
13 years 8 months ago
Recognizing human actions in still images: a study of bag-of-features and part-based representations
Recognition of human actions is usually addressed in the scope of video interpretation. Meanwhile, common human actions such as "reading a book", "playing a guitar&...
Vincent Delaitre, Ivan Laptev, Josef Sivic