Sciweavers

851 search results - page 3 / 171
» History Effects and Verification
Sort
View
IUI
2012
ACM
12 years 1 months ago
Effective browsing and serendipitous discovery with an experience-infused browser
In the digital age, users can have perfect recall of their digital experiences. In this paper, we explore how this recall can be leveraged during web browsing. We have built a sys...
Sudheendra Hangal, Abhinay Nagpal, Monica S. Lam
ICPADS
2005
IEEE
13 years 11 months ago
Embedded Fingerprint Verification System
Fingerprint verification is one of the most reliable personal identification methods in biometrics. In this paper, an effective fingerprint verification system is presented. We de...
Gwo-Cheng Chao, Shung-Shing Lee, Hung-Chuan Lai, S...
GG
2010
Springer
13 years 5 months ago
A False History of True Concurrency: From Petri to Tools
I briefly review the history of the unfolding approach to model checking. Carl Adam Petri passed away on July 2, 2010. I learnt about his death three days later, a few hours after ...
Javier Esparza
SCL
2008
95views more  SCL 2008»
13 years 5 months ago
Approximate reduction of dynamic systems
The reduction of dynamic systems has a rich history, with many important applications related to stability, control and verification. Reduction of nonlinear systems is typically p...
Paulo Tabuada, Aaron D. Ames, A. Agung Julius, Geo...
ICSE
2007
IEEE-ACM
14 years 5 months ago
Predicting Faults from Cached History
We analyze the version history of 7 software systems to predict the most fault prone entities and files. The basic assumption is that faults do not occur in isolation, but rather ...
Sunghun Kim, Thomas Zimmermann, E. James Whitehead...