Sciweavers

1509 search results - page 196 / 302
» Identifying Objects Using Cluster and Concept Analysis
Sort
View
COMPSAC
2006
IEEE
15 years 9 months ago
An Ontology-Based Approach to Software Comprehension - Reasoning about Security Concerns
There exists a large variety of techniques to detect and correct software security vulnerabilities at the source code level, including human code reviews, testing, and static anal...
Yonggang Zhang, Juergen Rilling, Volker Haarslev
JMM2
2007
183views more  JMM2 2007»
15 years 2 months ago
A Chaos Theoretic Analysis of Motion and Illumination in Video Sequences
— Accurate and robust image motion detection has been of substantial interest in the image processing and computer vision communities. Unfortunately, no single motion detection a...
Michael E. Farmer
WCET
2010
15 years 25 days ago
A Code Policy Guaranteeing Fully Automated Path Analysis
Calculating the worst-case execution time (WCET) of real-time tasks is still a tedious job. Programmers are required to provide additional information on the program flow, analyzi...
Benedikt Huber, Peter P. Puschner
ICADL
2003
Springer
159views Education» more  ICADL 2003»
15 years 8 months ago
Ontology Learning for Medical Digital Libraries
Ontologies play an important role in the Semantic Web as well as in digital library and knowledge portal applications. This project seeks to develop an automatic method to enrich e...
Chew-Hung Lee, Jin-Cheon Na, Christopher S. G. Kho...
BMCBI
2011
14 years 9 months ago
PheMaDB: A solution for storage, retrieval, and analysis of high throughput phenotype data
Background: OmniLog™ phenotype microarrays (PMs) have the capability to measure and compare the growth responses of biological samples upon exposure to hundreds of growth condit...
Wenling E. Chang, Keri Sarver, Brandon W. Higgs, T...