Sciweavers

1548 search results - page 236 / 310
» Estimating Software Vulnerabilities
Sort
View
LREC
2008
70views Education» more  LREC 2008»
15 years 20 days ago
Process Model for Composing High-quality Text Corpora
The Teko corpus composing model offers a decentralized, dynamic way of collecting high-quality text corpora for linguistic research. The resulting corpus consists of independent t...
Mikko Lounela
MVA
2007
129views Computer Vision» more  MVA 2007»
15 years 20 days ago
Calculation of Bedding Angles Inclination from Drill Core Digital Images
In this paper, we describe a new technique for the automatic orientation of bedding in drill core from digital images. Images are planar pictures of the drill core, and we show th...
Thomas Quiniou, Nazha Selmaoui, Christine Laporte-...
CSREAESA
2003
15 years 18 days ago
Worst Case Execution Time Analysis for Petri Net Models of Embedded Systems
We present an approach for Worst-Case Execution Time (WCET) Analysis of embedded system software, that is generated from Petri net specifications. The presented approach is part ...
Friedhelm Stappert, Carsten Rust
ISVC
2010
Springer
15 years 15 days ago
Single camera stereo system using prism and mirrors
Stereo and 3D reconstruction are used by many applications such as object modeling, facial expression studies and human motion analysis. But synchronizing multiple high frame rate ...
Gowri Somanath, Rohith MV, Chandra Kambhamettu
CCCG
2009
15 years 10 days ago
Defining and computing accessibility radius
In structural molecular biology software, the accessibility of an atom in a molecule to a ball representing solvent is either computed slowly by building a solventaccessible surfa...
Vishal Verma, Jack Snoeyink