Sciweavers

1682 search results - page 240 / 337
» Applying Conventional Testing Techniques for Class Testing
Sort
View
BMVC
1998
15 years 6 months ago
Writer Identification from Non-uniformly Skewed Handwriting Images
Many techniques have been reported for handwriting-based writer identification. Most such techniques assume that the written text is fixed (e.g., in signature verification). In th...
H. E. S. Said, G. S. Peake, T. N. Tan, Keith D. Ba...
139
Voted
FTCS
1998
114views more  FTCS 1998»
15 years 6 months ago
Verification of a Safety-Critical Railway Interlocking System with Real-Time Constraints
Ensuring the correctness of computer systems used in lifecritical applications is very difficult. The most commonly used verification methods, simulation and testing, are not exha...
Vicky Hartonas-Garmhausen, Sérgio Vale Agui...
148
Voted
SYRCODIS
2007
72views Database» more  SYRCODIS 2007»
15 years 5 months ago
An XML-to-Relational User-Driven Mapping Strategy Based on Similarity and Adaptivity
As XML has become a standard for data representation, it is inevitable to propose and implement techniques for efficient managing of XML data. A natural alternative is to exploit...
Irena Mlynkova
167
Voted
CIBCB
2009
IEEE
15 years 5 months ago
Application of machine learning approaches on quantitative structure activity relationships
Machine Learning techniques are successfully applied to establish quantitative relations between chemical structure and biological activity (QSAR), i.e. classify compounds as activ...
Mariusz Butkiewicz, Ralf Mueller, Danilo Selic, Er...
CIDM
2007
IEEE
15 years 4 months ago
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining
— Detecting unknown worms is a challenging task. Extant solutions, such as anti-virus tools, rely mainly on prior explicit knowledge of specific worm signatures. As a result, aft...
Robert Moskovitch, Ido Gus, Shay Pluderman, Dima S...