Sciweavers

631 search results - page 62 / 127
» Deriving Specifications from Requirements: An Example
Sort
View
FLAIRS
2008
15 years 2 months ago
Extending Nearest Neighbor Classification with Spheres of Confidence
The standard kNN algorithm suffers from two major drawbacks: sensitivity to the parameter value k, i.e., the number of neighbors, and the use of k as a global constant that is ind...
Ulf Johansson, Henrik Boström, Rikard Kö...
WSCG
2003
149views more  WSCG 2003»
15 years 1 months ago
Boolean Operations on Feature-based Models
Boolean operations and feature-based modeling are closely linked domains. For example, several, sometimes many Boolean operations are involved during a feature instantiation or mo...
Yvon Gardan, Christian Minich, Estelle Perrin
ICPR
2008
IEEE
16 years 1 months ago
Spatio-temporal 3D pose estimation and tracking of human body parts using the Shape Flow algorithm
In this contribution we introduce the Shape Flow algorithm (SF), a novel method for spatio-temporal 3D pose estimation of a 3D parametric curve. The SF is integrated into a tracki...
Markus Hahn, Lars Krüger, Christian Wöhl...
CODES
2009
IEEE
15 years 6 months ago
On compile-time evaluation of process partitioning transformations for Kahn process networks
Kahn Process Networks is an appealing model of computation for programming and mapping applications onto multi-processor platforms. Autonomous processes communicate through unboun...
Sjoerd Meijer, Hristo Nikolov, Todor Stefanov
MODELLIERUNG
2008
15 years 1 months ago
Modelling Security Goals in Business Processes
: Various types of security goals, such as authentication or confidentiality, can be defined as policies for process-aware information systems, typically in a manual fashion. There...
Christian Wolter, Michael Menzel, Christoph Meinel