Sciweavers

467 search results - page 38 / 94
» I O-automata Based Testing
Sort
View
93
Voted
RTSS
1995
IEEE
15 years 4 months ago
Dual Priority Scheduling
In this paper, we present a new strategy for providing flexibility in hard real-time systems. This approach, based on dual priorities, retains the offline guarantees afforded to...
Robert I. Davis, Andy J. Wellings
110
Voted
CIVR
2007
Springer
149views Image Analysis» more  CIVR 2007»
15 years 6 months ago
Video copy detection: a comparative study
This paper presents a comparative study of methods for video copy detection. Different state-of-the-art techniques, using various kinds of descriptors and voting functions, are d...
Julien Law-To, Li Chen, Alexis Joly, Ivan Laptev, ...
93
Voted
MICRO
2006
IEEE
117views Hardware» more  MICRO 2006»
15 years 6 months ago
PathExpander: Architectural Support for Increasing the Path Coverage of Dynamic Bug Detection
Dynamic software bug detection tools are commonly used because they leverage run-time information. However, they suffer from a fundamental limitation, the Path Coverage Problem: t...
Shan Lu, Pin Zhou, Wei Liu, Yuanyuan Zhou, Josep T...
KDD
2003
ACM
266views Data Mining» more  KDD 2003»
16 years 27 days ago
Applying data mining in investigating money laundering crimes
In this paper, we study the problem of applying data mining to facilitate the investigation of money laundering crimes (MLCs). We have identified a new paradigm of problems --- th...
Zhongfei (Mark) Zhang, John J. Salerno, Philip S. ...
96
Voted
IRI
2006
IEEE
15 years 6 months ago
T2K2: A type II KASER
—The transformational methodology described in this paper induces new knowledge, which may be open under any deductive process. The method of transposition is used to maintain a ...
Stuart Harvey Rubin, Shu-Ching Chen, James B. Law