Sciweavers

4636 search results - page 846 / 928
» Application of Linguistic Techniques for Use Case Analysis
Sort
View
81
Voted
SCALESPACE
1999
Springer
15 years 2 months ago
Morphing Active Contours
ÐA method for deforming curves in a given image to a desired position in a second image is introduced in this paper. The algorithm is based on deforming the first image toward the...
Marcelo Bertalmío, Guillermo Sapiro, Gregor...
75
Voted
HASE
1997
IEEE
15 years 2 months ago
ReSoFT: A Reusable Testbed for Development and Evaluation of Software Fault-Tolerant Systems
The Reusable Software Fault Tolerance Testbed ReSoFT was developed to facilitate the development and evaluation of high-assurance systems that require tolerance of both hardware...
Kam S. Tso, Eltefaat Shokri, Roger J. Dziegiel Jr.
ACCV
2006
Springer
15 years 1 months ago
Effects of Image Segmentation for Approximating Object Appearance Under Near Lighting
Shading analysis of an object under near lighting is not an easy task, because the direction and distance of the light source vary over the surface of the object. Observing a small...
Takahiro Okabe, Yoichi Sato
CSFW
2004
IEEE
15 years 1 months ago
Secure Information Flow by Self-Composition
Non-interference is a high-level security property that guarantees the absence of illicit information leakages through executing programs. More precisely, non-interference for a p...
Gilles Barthe, Pedro R. D'Argenio, Tamara Rezk
EMISA
2006
Springer
15 years 1 months ago
Challenges and Solutions in Planning Information Systems for Networked Value Constellations
: Nowadays businesses often decide to form networked value constellations in order to satisfy complex customer needs. To fulfill the value-based requirements of an e-Business idea ...
Novica Zarvic, Maya Daneva