Sciweavers

2874 search results - page 530 / 575
» Intrusion Detection: Systems and Models
Sort
View
ICCV
1999
IEEE
16 years 1 months ago
Object Recognition from Local Scale-Invariant Features
Proc. of the International Conference on Computer Vision, Corfu (Sept. 1999) An object recognition system has been developed that uses a new class of local image features. The fea...
David G. Lowe
ICIP
2009
IEEE
16 years 25 days ago
Facial Marks: Soft Biometric For Face Recognition
We propose to utilize micro features, namely facial marks (e.g., freckles, moles, and scars) to improve face recognition and retrieval performance. Facial marks can be used in thr...
ICSE
2008
IEEE-ACM
16 years 18 days ago
Analyzing medical processes
This paper shows how software engineering technologies used to define and analyze complex software systems can also be effective in detecting defects in human-intensive processes ...
Bin Chen, George S. Avrunin, Elizabeth A. Henneman...
ICSE
2008
IEEE-ACM
16 years 18 days ago
jPredictor: a predictive runtime analysis tool for java
JPREDICTOR is a tool for detecting concurrency errors in JAVA programs. The JAVA program is instrumented to emit property-relevant events at runtime and then executed. The resulti...
Feng Chen, Traian-Florin Serbanuta, Grigore Rosu
ICSE
2008
IEEE-ACM
16 years 18 days ago
Automatic modularity conformance checking
According to Parnas's information hiding principle and Baldwin and Clark's design rule theory, the key step to decomposing a system into modules is to determine the desi...
Sunny Huynh, Yuanfang Cai, Yuanyuan Song, Kevin J....