Sciweavers

1486 search results - page 164 / 298
» Firewall Rules Analysis
Sort
View
EDOC
2000
IEEE
15 years 8 months ago
Model Checking of Workflow Schemas
Practical experience indicates that the definition of realworld workflow applications is a complex and error-prone process. Existing workflow management systems provide the means,...
Christos T. Karamanolis, Dimitra Giannakopoulou, J...
KBSE
1997
IEEE
15 years 8 months ago
Application of Formal Methods to the Development of a Software Maintenance Tool
Partial evaluation is an optimization technique traditionally used in compilation. We have adapted this technique to the understanding of scientic application programs during t...
Sandrine Blazy, Philippe Facon
CIVR
2006
Springer
113views Image Analysis» more  CIVR 2006»
15 years 8 months ago
Eliciting Perceptual Ground Truth for Image Segmentation
In this paper, we investigate human visual perception and establish a body of ground truth data elicited from human visual studies. We aim to build on the formative work of Ren, E...
Victoria J. Hodge, Garry Hollier, John P. Eakins, ...
WSC
2008
15 years 6 months ago
A new method for bottleneck detection
This paper presents a new method to identify and rank the bottlenecks in a manufacturing system. The proposed method is based on performance related data that are easy to capture,...
Sankar Sengupta, Kanchan Das, Robert P. VanTil
IJCAI
2007
15 years 5 months ago
A Factor Graph Model for Software Bug Finding
Automatic tools for finding software errors require knowledge of the rules a program must obey, or “specifications,” before they can identify bugs. We present a method that ...
Ted Kremenek, Andrew Y. Ng, Dawson R. Engler