Sciweavers

3212 search results - page 532 / 643
» Faster Concept Analysis
Sort
View
IEEESCC
2007
IEEE
15 years 5 months ago
Enabling User Control with Personal Identity Management
Being proactive and vigilant is the best defense against identity theft and the invasion of privacy. This recurrent advice from the public broadcasting attests that security breac...
Ty Mey Eap, Marek Hatala, Dragan Gasevic
ISBI
2007
IEEE
15 years 5 months ago
Postprocessing of Brain White Matter Fiber Orientation Distribution Functions
By acquiring high angular resolution diffusion weighted magnetic resonance images (HARDI), Q-Ball analysis can disclose the 3D organization of fibrous tissue such as the brain whi...
Steven Delputte, Hans Dierckx, Els Fieremans, Yves...
KBSE
2007
IEEE
15 years 5 months ago
Feature location via information retrieval based filtering of a single scenario execution trace
The paper presents a semi-automated technique for feature location in source code. The technique is based on combining information from two different sources: an execution trace, ...
Dapeng Liu, Andrian Marcus, Denys Poshyvanyk, Vacl...
KBSE
2007
IEEE
15 years 5 months ago
Extracting rights and obligations from regulations: toward a tool-supported process
Security, privacy and governance are increasingly the focus of government regulations in the U.S., Europe and elsewhere. This trend has created a “regulation compliance” probl...
Nadzeya Kiyavitskaya, Nicola Zeni, Travis D. Breau...
SEFM
2007
IEEE
15 years 5 months ago
Automatically Proving Concurrent Programs Correct
of abstract interpretations in formal methods It is always very satisfying to hear about a theory, in the case at hand it is the theory of abstract interpretations, that explains i...
Byron Cook