Sciweavers

2916 search results - page 439 / 584
» Generating Rule Sets from Model Trees
Sort
View
148
Voted
CSREASAM
2006
15 years 5 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
CGI
1998
IEEE
15 years 8 months ago
Deformable Surfaces for Feature Based Indirect Volume Rendering
In this paper we present an indirect volume visualization method, based on the deformable surface model, which is a three dimensional extension of the snake segmentation method. I...
Christoph Lürig, Leif Kobbelt, Thomas Ertl
ESEM
2007
ACM
15 years 8 months ago
A Critical Analysis of Empirical Research in Software Testing
In the foreseeable future, software testing will remain one of the best tools we have at our disposal to ensure software dependability. Empirical studies are crucial to software t...
Lionel C. Briand
FGR
2006
IEEE
121views Biometrics» more  FGR 2006»
15 years 8 months ago
Optimal Hand Gesture Vocabulary Design Using Psycho-Physiological and Technical Factors
A global approach to hand gesture vocabulary design is proposed which includes human as well as technical design factors. The human centered desires of multiple users are implicit...
Helman Stern, Juan P. Wachs, Yael Edan
BMCBI
2007
106views more  BMCBI 2007»
15 years 4 months ago
Constructing a meaningful evolutionary average at the phylogenetic center of mass
Background: As a consequence of the evolutionary process, data collected from related species tend to be similar. This similarity by descent can obscure subtler signals in the dat...
Eric A. Stone, Arend Sidow