Sciweavers

6258 search results - page 1032 / 1252
» Applied Text Generation
Sort
View
ICSE
2010
IEEE-ACM
15 years 6 months ago
Requirements reflection: requirements as runtime entities
Computational reflection is a well-established technique that gives a program the ability to dynamically observe and possibly modify its behaviour. To date, however, reflection is...
Nelly Bencomo, Jon Whittle, Peter Sawyer, Anthony ...
BIBE
2007
IEEE
126views Bioinformatics» more  BIBE 2007»
15 years 6 months ago
An End-to-End Process for Cancer Identification from Images of Lung Tissue
— This research describes a non-interactive process that applies several forms of computational intelligence to the task of classifying biopsy lung tissue samples based on visual...
Walker H. Land Jr., Daniel W. McKee, Tatyana Zhuko...
CLEF
2008
Springer
15 years 6 months ago
Exploiting Term Co-occurrence for Enhancing Automated Image Annotation
This paper describes an application of statistical co-occurrence techniques that built on top of a probabilistic image annotation framework is able to increase the precision of an ...
Ainhoa Llorente, Simon E. Overell, Haiming Liu 000...
CODES
2008
IEEE
15 years 6 months ago
Model checking SystemC designs using timed automata
SystemC is widely used for modeling and simulation in hardware/software co-design. Due to the lack of a complete formal semantics, it is not possible to verify SystemC designs. In...
Paula Herber, Joachim Fellmuth, Sabine Glesner
CONEXT
2008
ACM
15 years 6 months ago
High performance traffic shaping for DDoS mitigation
Distributed Denial of Service (DDoS) attack mitigation systems usually generate a list of filter rules in order to block malicious traffic. In contrast to this binary decision we ...
Markus Goldstein, Matthias Reif, Armin Stahl, Thom...
« Prev « First page 1032 / 1252 Last » Next »