Sciweavers

2351 search results - page 147 / 471
» A Method of Requirement Inconsistency Analysis
Sort
View
ICSE
2005
IEEE-ACM
15 years 10 months ago
Static analysis tools as early indicators of pre-release defect density
During software development it is helpful to obtain early estimates of the defect density of software components. Such estimates identify fault-prone areas of code requiring furth...
Nachiappan Nagappan, Thomas Ball
71
Voted
DATE
2008
IEEE
131views Hardware» more  DATE 2008»
15 years 4 months ago
Parametric Throughput Analysis of Synchronous Data Flow Graphs
Synchronous Data Flow Graphs (SDFGs) have proved to be a very successful tool for modeling, analysis and synthesis of multimedia applications targeted at both single- and multiproc...
Amir Hossein Ghamarian, Marc Geilen, Twan Basten, ...
PR
2007
145views more  PR 2007»
14 years 9 months ago
Face recognition using a kernel fractional-step discriminant analysis algorithm
Feature extraction is among the most important problems in face recognition systems. In this paper, we propose an enhanced kernel discriminant analysis (KDA) algorithm called kern...
Guang Dai, Dit-Yan Yeung, Yuntao Qian
ICFCA
2004
Springer
15 years 3 months ago
FCA in Knowledge Technologies: Experiences and Opportunities
Abstract. Managing knowledge is a difficult and slippery enterprise. A wide variety of technologies have to be invoked in providing support for knowledge requirements, ranging fro...
Yannis Kalfoglou, Srinandan Dasmahapatra, Yun-Heh ...
77
Voted
ITCC
2005
IEEE
15 years 3 months ago
On the Masking Countermeasure and Higher-Order Power Analysis Attacks
Abstract— Masking is a general method used to thwart Differential Power Analysis, in which all the intermediate data inside an implementation are XORed with random Boolean values...
François-Xavier Standaert, Eric Peeters, Je...