Sciweavers

433 search results - page 45 / 87
» Contracts: From Analysis to C Implementation
Sort
View
CIVR
2005
Springer
145views Image Analysis» more  CIVR 2005»
15 years 5 months ago
Person Tracking and Multicamera Video Retrieval Using Floor Sensors in a Ubiquitous Environment
A system for video retrieval from a ubiquitous environment is presented. Data from pressure-based floor sensors are used as a supplementary input for retrieving video from a large...
Gamhewage C. de Silva, Takayuki Ishikawa, Toshihik...
CSMR
2004
IEEE
15 years 3 months ago
Source Code Modularization Using Lattice of Concept Slices
Most legacy systems have been altered due to prolonged maintenance to the point that they deviate significantly from their original and intended design and consequently, they lack...
Raihan Al-Ekram, Kostas Kontogiannis
SAGA
2007
Springer
15 years 6 months ago
Probabilistic Techniques in Algorithmic Game Theory
We consider applications of probabilistic techniques in the framework of algorithmic game theory. We focus on three distinct case studies: (i) The exploitation of the probabilistic...
Spyros C. Kontogiannis, Paul G. Spirakis
SIAMCOMP
2002
138views more  SIAMCOMP 2002»
14 years 11 months ago
Phase Change of Limit Laws in the Quicksort Recurrence under Varying Toll Functions
We characterize all limit laws of the quicksort type random variables defined recursively by Xn d = XIn + X n-1-In + Tn when the "toll function" Tn varies and satisfies ...
Hsien-Kuei Hwang, Ralph Neininger
IPPS
2006
IEEE
15 years 5 months ago
Network intrusion detection with semantics-aware capability
Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we propose a network intrusion detectio...
Walter J. Scheirer, Mooi Choo Chuah