We present a method to systematically detect feature interactions in requirements, which are expressed as constraints on system event traces. We show its application on the lift sy...
In this paper, the problem of face authentication using salient facial features together with statistical generative models is adressed. Actually, classical generative models, and ...
We present a data-driven approach to predict the importance of edges and construct a Markov network for image analysis based on statistical models of global and local image feature...
Developing highly efficient and reliable embedded systems demands hardware/software (HW/SW) co-design and, therefore, co-simulation. In order to be highly configurable, embedded...
E-contracts are used to describe the supply and the consumption details of e-services within a business process. The establishment of e-contracts in a given application domain usu...
Marcelo Fantinato, Maria Beatriz Felgar de Toledo,...