People often use software for mundane tasks and expect it to be dependable enough for their needs. Unfortunately, the incomplete and imprecise specifications of such everyday sof...
Orna Raz, Rebecca B. Buchheit, Mary Shaw, Philip K...
Abstract. In this paper, we consider the Independent Component Analysis problem when the hidden sources are non-negative (Non-negative ICA). This problem is formulated as a non-lin...
Wendyam Serge Boris Ouedraogo, Antoine Souloumiac,...
Abstract: In this paper we present an entropy based method to analyze complex systems. Systems are treated as black boxes, which only expose information by some specified paramete...
The article presents an approach to development of software standards usage infrastructure. The approach is based on formalization of standards and automated conformance test deriv...
Alexey Grinevich, Alexey V. Khoroshilov, Victor V....
This paper proposes a technique for three-dimensional reconstruction of an underwater environment from range views acquired by an acoustic camera. The final target of the work lie...