Sciweavers

1494 search results - page 57 / 299
» Less Extreme Programming
Sort
View
MICAI
2000
Springer
15 years 3 months ago
Searching for a Solution to Program Verification=Equation Solving in CCS
Unique Fixpoint Induction, UFI, is a chief inference rule to prove the equivalence of recursive processes in CCS [7]. It plays a major role in the equational approach to verificati...
Raul Monroy, Alan Bundy, Ian Green
KDD
2006
ACM
142views Data Mining» more  KDD 2006»
16 years 7 days ago
Mining distance-based outliers from large databases in any metric space
Let R be a set of objects. An object o R is an outlier, if there exist less than k objects in R whose distances to o are at most r. The values of k, r, and the distance metric ar...
Yufei Tao, Xiaokui Xiao, Shuigeng Zhou
IJCV
2007
113views more  IJCV 2007»
14 years 11 months ago
Boosting Sex Identification Performance
This paper presents a method based on AdaBoost to identify the sex of a person from a low resolution grayscale picture of their face. The method described here is implemented in a...
Shumeet Baluja, Henry A. Rowley
HASKELL
2009
ACM
15 years 6 months ago
Roll your own test bed for embedded real-time protocols: a haskell experience
We present by example a new application domain for functional languages: emulators for embedded real-time protocols. As a casestudy, we implement a simple emulator for the Biphase...
Lee Pike, Geoffrey M. Brown, Alwyn Goodloe
SIGOPSE
2004
ACM
15 years 5 months ago
Using AOP to develop architectural-neutral operating system components
The architecture of an operating system, e.g. micro kernel or monolithic kernel, is usually seen as something static. Even during the long lasting evolution of operating system co...
Olaf Spinczyk, Daniel Lohmann