Sciweavers

2237 search results - page 265 / 448
» Analysis and Testing of Web Applications
Sort
View
COMPSAC
2006
IEEE
15 years 11 months ago
An Ontology-Based Approach to Software Comprehension - Reasoning about Security Concerns
There exists a large variety of techniques to detect and correct software security vulnerabilities at the source code level, including human code reviews, testing, and static anal...
Yonggang Zhang, Juergen Rilling, Volker Haarslev
SAS
2005
Springer
162views Formal Methods» more  SAS 2005»
15 years 10 months ago
Boolean Heaps
We show that the idea of predicates on heap objects can be cast in the framework of predicate abstraction. This leads to an alternative view on the underlying concepts of three-val...
Andreas Podelski, Thomas Wies
ICIAR
2004
Springer
15 years 10 months ago
Three-Dimensional Face Recognition: A Fishersurface Approach
Previous work has shown that principal component analysis (PCA) of three-dimensional face models can be used to perform recognition to a high degree of accuracy. However, experimen...
Thomas Heseltine, Nick Pears, Jim Austin
146
Voted
IDEAL
2009
Springer
15 years 2 months ago
An Automatic Segmentation and Reconstruction of Mandibular Structures from CT-Data
In any medical data analysis a good visualization of specific parts or tissues are fundamental in order to perform accurate diagnosis and treatments. For a better understanding of ...
Iñigo Barandiarán, Iván Mac&i...
132
Voted
LREC
2008
118views Education» more  LREC 2008»
15 years 6 months ago
What would you Ask a conversational Agent? Observations of Human-Agent Dialogues in a Museum Setting
Embodied Conversational Agents have typically been constructed for use in limited domain applications, and tested in very specialized environments. Only in recent years have there...
Susan Robinson, David R. Traum, Midhun Ittycheriah...