Sciweavers

31 search results - page 3 / 7
» Detection of Global Predicates: Techniques and Their Limitat...
Sort
View
CAV
2009
Springer
206views Hardware» more  CAV 2009»
16 years 5 days ago
D-Finder: A Tool for Compositional Deadlock Detection and Verification
D-Finder tool implements a compositional method for the verification of component-based systems described in BIP language encompassing multi-party interaction. For deadlock detecti...
Saddek Bensalem, Marius Bozga, Thanh-Hung Nguyen, ...
103
Voted
TIFS
2008
129views more  TIFS 2008»
14 years 11 months ago
On Empirical Recognition Capacity of Biometric Systems Under Global PCA and ICA Encoding
Performance of biometric-based recognition systems depends on various factors: database quality, image preprocessing, encoding techniques, etc. Given a biometric database and a se...
Natalia A. Schmid, Francesco Nicolo
178
Voted
ICDE
2003
IEEE
144views Database» more  ICDE 2003»
16 years 1 months ago
Scalable template-based query containment checking for web semantic caches
Semantic caches, originally proposed for client-server database systems, are being recently deployed to accelerate the serving of dynamic web content by transparently caching data...
Khalil Amiri, Sanghyun Park, Renu Tewari, Sriram P...
ICSE
2008
IEEE-ACM
16 years 13 days ago
Scalable detection of semantic clones
Several techniques have been developed for identifying similar code fragments in programs. These similar fragments, referred to as code clones, can be used to identify redundant c...
Mark Gabel, Lingxiao Jiang, Zhendong Su
101
Voted
MICCAI
2002
Springer
16 years 15 days ago
Detecting Wedge Shaped Defects in Polarimetric Images of the Retinal Nerve Fiber Layer
Wedge shaped defects of the retinal nerve fiber layer (RNFL) may occur in glaucoma. Currently, automatic detection of wedge shaped defects in Scanning Laser Polarimetry images of t...
Koen Vermeer, Frans Vos, Hans Lemij, Albert M. Vos...