Sciweavers

257 search results - page 31 / 52
» From Extracting to Abstracting: Generating Quasi-abstractive...
Sort
View
ENTCS
2008
113views more  ENTCS 2008»
14 years 9 months ago
A Model-Based Approach to the Verification and Adaptation of WF/.NET Components
This paper presents an approach which supports verification and model-based adaptation of software compod services implemented using Windows Workflow Foundation (WF). First, we pr...
Javier Cubo, Gwen Salaün, Carlos Canal, Ernes...
FASE
2009
Springer
15 years 4 months ago
Finding Loop Invariants for Programs over Arrays Using a Theorem Prover
Abstract. We present a new method for automatic generation of loop invariants for programs containing arrays. Unlike all previously known methods, our method allows one to generate...
Laura Kovács, Andrei Voronkov
SP
2003
IEEE
107views Security Privacy» more  SP 2003»
15 years 3 months ago
Anomaly Detection Using Call Stack Information
The call stack of a program execution can be a very good information source for intrusion detection. There is no prior work on dynamically extracting information from call stack a...
Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fo...
TCSV
2008
148views more  TCSV 2008»
14 years 9 months ago
Modeling Background and Segmenting Moving Objects from Compressed Video
Abstract--Modeling background and segmenting moving objects are significant techniques for video surveillance and other video processing applications. Most existing methods of mode...
Weiqiang Wang, Jie Yang, Wen Gao
AIME
2007
Springer
15 years 4 months ago
Machine Learning Techniques for Decision Support in Anesthesia
Abstract. The growing availability of measurement devices in the operating room enables the collection of a huge amount of data about the state of the patient and the doctors’ pr...
Olivier Caelen, Gianluca Bontempi, Luc Barvais