Sciweavers

2006 search results - page 163 / 402
» Heuristic Security-Testing Methods
Sort
View
ICSM
2000
IEEE
15 years 5 months ago
Recovering Class Diagrams from Data-Intensive Legacy Systems
Several reverse engineering methods for recovering objects from legacy systems have been proposed in the literature, but most of them neglect to identify the relationships among t...
Giuseppe A. Di Lucca, Anna Rita Fasolino, Ugo de C...
CAV
2000
Springer
89views Hardware» more  CAV 2000»
15 years 5 months ago
Tuning SAT Checkers for Bounded Model Checking
Abstract. Bounded Model Checking based on SAT methods has recently been introduced as a complementary technique to BDD-based Symbolic Model Checking. The basic idea is to search fo...
Ofer Strichman
126
Voted
CAIP
2009
Springer
128views Image Analysis» more  CAIP 2009»
15 years 5 months ago
Significance Tests and Statistical Inequalities for Segmentation by Region Growing on Graph
Bottom-up segmentation methods merge similar neighboring regions according to a decision rule and a merging order. In this paper, we propose a contribution for each of these two po...
Guillaume Née, Stéphanie Jehan-Besso...
113
Voted
ECML
2007
Springer
15 years 5 months ago
Seeing the Forest Through the Trees: Learning a Comprehensible Model from an Ensemble
Abstract. Ensemble methods are popular learning methods that usually increase the predictive accuracy of a classifier though at the cost of interpretability and insight in the deci...
Anneleen Van Assche, Hendrik Blockeel
95
Voted
FMCAD
2008
Springer
15 years 2 months ago
Invariant-Strengthened Elimination of Dependent State Elements
Abstract-- This work presents a technology-independent synthesis optimization that is effective in reducing the total number of state elements of a design. It works by identifying ...
Michael L. Case, Alan Mishchenko, Robert K. Brayto...