Sciweavers

390 search results - page 47 / 78
» Japanese Dependency Analysis Using the Ancestor-Descendant R...
Sort
View
IEEEARES
2007
IEEE
15 years 7 months ago
A Pattern System for Security Requirements Engineering
We present a pattern system for security requirements engineering, consisting of security problem frames and concretized security problem frames. These are special kinds of proble...
Denis Hatebur, Maritta Heisel, Holger Schmidt
ICRA
2006
IEEE
134views Robotics» more  ICRA 2006»
15 years 7 months ago
Validation and Explanation of Waterhammer-based Locomotion
ACT Search and rescue robots often use tethers to provide power and communication, but tethers get caught on debris and small robots have difficulty with the added drag of the tet...
Ross L. Feller, Douglas P. Perrin, Robert D. Howe
ASWEC
2005
IEEE
15 years 7 months ago
A Formal Method for Program Slicing
Program slicing is a well-known program analysis technique that extracts the elements of a program related to a particular computation. Based on modular monadic semantics of a pro...
Yingzhou Zhang, Baowen Xu, José Emilio Labr...
CIE
2006
Springer
15 years 5 months ago
On Graph Isomorphism for Restricted Graph Classes
Abstract. Graph isomorphism (GI) is one of the few remaining problems in NP whose complexity status couldn't be solved by classifying it as being either NP-complete or solvabl...
Johannes Köbler
BIBE
2009
IEEE
131views Bioinformatics» more  BIBE 2009»
15 years 4 months ago
Learning Scaling Coefficient in Possibilistic Latent Variable Algorithm from Complex Diagnosis Data
—The Possibilistic Latent Variable (PLV) clustering algorithm is a powerful tool for the analysis of complex datasets due to its robustness toward data distributions of different...
Zong-Xian Yin