Sciweavers

570 search results - page 91 / 114
» Evaluating Usability Evaluation Methods: Criteria, Method an...
Sort
View
ASE
2008
120views more  ASE 2008»
14 years 9 months ago
Requirements model generation to support requirements elicitation: the Secure Tropos experience
In the last years several efforts have been devoted by researchers in the Requirements Engineering community to the development of methodologies for supporting designers during req...
Nadzeya Kiyavitskaya, Nicola Zannone
PRL
2006
85views more  PRL 2006»
14 years 9 months ago
Image segmentation based on merging of sub-optimal segmentations
In this paper a heuristic segmentation algorithm is presented based on the oversegmentation of an image. The method uses a set of different segmentations of the image produced pre...
Juan Carlos Pichel, David E. Singh, Francisco F. R...
91
Voted
SPIN
2010
Springer
14 years 7 months ago
Context-Enhanced Directed Model Checking
Directed model checking is a well-established technique to efficiently tackle the state explosion problem when the aim is to find error states in concurrent systems. Although dir...
Martin Wehrle, Sebastian Kupferschmid
92
Voted
VLDB
2010
ACM
190views Database» more  VLDB 2010»
14 years 7 months ago
Continuous authentication on relational streams
According to the database outsourcing model, a data owner delegates database functionality to a thirdparty service provider, which answers queries received from clients. Authentic...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias
FCCM
2007
IEEE
107views VLSI» more  FCCM 2007»
15 years 3 months ago
Optimizing Logarithmic Arithmetic on FPGAs
This paper proposes optimizations of the methods and parameters used in both mathematical approximation and hardware design for logarithmic number system (LNS) arithmetic. First, ...
Haohuan Fu, Oskar Mencer, Wayne Luk