Sciweavers

2351 search results - page 354 / 471
» A Method of Requirement Inconsistency Analysis
Sort
View
ICDAR
1995
IEEE
15 years 1 months ago
Semi-automatic delineation of regions in floor plans
We propose a technique that makes use of a proximity metric for delineating partially or fully bounded regions of a scanned bitmap that depicts a building floor plan. A proximity...
Kathy Ryall, Stuart M. Shieber, Joe Marks, Murray ...
FAST
2010
15 years 10 days ago
Discovery of Application Workloads from Network File Traces
An understanding of application I/O access patterns is useful in several situations. First, gaining insight into what applications are doing with their data at a semantic level he...
Neeraja J. Yadwadkar, Chiranjib Bhattacharyya, K. ...
CASES
2005
ACM
14 years 12 months ago
Segment protection for embedded systems using run-time checks
The lack of virtual memory protection is a serious source of unreliability in many embedded systems. Without the segment-level protection it provides, these systems are subject to...
Matthew Simpson, Bhuvan Middha, Rajeev Barua
BMCBI
2010
143views more  BMCBI 2010»
14 years 10 months ago
ETE: a python Environment for Tree Exploration
Background: Many bioinformatics analyses, ranging from gene clustering to phylogenetics, produce hierarchical trees as their main result. These are used to represent the relations...
Jaime Huerta-Cepas, Joaquín Dopazo, Toni Ga...
CGF
2010
189views more  CGF 2010»
14 years 10 months ago
Space-in-Time and Time-in-Space Self-Organizing Maps for Exploring Spatiotemporal Patterns
Spatiotemporal data pose serious challenges to analysts in geographic and other domains. Owing to the complexity of the geospatial and temporal components, this kind of data canno...
Gennady L. Andrienko, Natalia V. Andrienko, Sebast...