Sciweavers

3801 search results - page 677 / 761
» An Approach to Modeling Software Safety
Sort
View
GCB
2008
Springer
103views Biometrics» more  GCB 2008»
14 years 11 months ago
Utilizing Promoter Pair Orientations for HMM-based Analysis of ChIP-chip Data
: Array-based analysis of chromatin immunoprecipitation data (ChIP-chip) is a powerful technique for identifying DNA target regions of individual transcription factors. Here, we pr...
Michael Seifert, Jens Keilwagen, Marc Strickert, I...
SOSYM
2010
174views more  SOSYM 2010»
14 years 8 months ago
Automatic generation of basic behavior schemas from UML class diagrams
: The specification of a software system must include all relevant static and dynamic aspects of the domain. Dynamic aspects are usually specified by means of a behavioral schema c...
Manoli Albert, Jordi Cabot, Cristina Gómez,...
WWW
2005
ACM
15 years 10 months ago
Middleware services for web service compositions
WS-* specifications cover a variety of issues ranging from security and reliability to transaction support in web services. However, these specifications do not address web servic...
Anis Charfi, Mira Mezini

Publication
1301views
15 years 10 months ago
Markovian Tracking-by-Detection from a Single, Uncalibrated Camera
We present an algorithm for multi-person tracking-bydetection in a particle filtering framework. To address the unreliability of current state-of-the-art object detectors, our a...
Michael D. Breitenstein, Fabian Reichlin, Bastian ...
MIDDLEWARE
2009
Springer
15 years 4 months ago
Why Do Upgrades Fail and What Can We Do about It?
Abstract. Enterprise-system upgrades are unreliable and often produce downtime or data-loss. Errors in the upgrade procedure, such as broken dependencies, constitute the leading ca...
Tudor Dumitras, Priya Narasimhan