Sciweavers

7557 search results - page 1470 / 1512
» Modeling Timed Concurrent Systems
Sort
View
ESEM
2010
ACM
14 years 10 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
IJCV
2010
261views more  IJCV 2010»
14 years 10 months ago
HumanEva: Synchronized Video and Motion Capture Dataset and Baseline Algorithm for Evaluation of Articulated Human Motion
While research on articulated human motion and pose estimation has progressed rapidly in the last few years, there has been no systematic quantitative evaluation of competing meth...
Leonid Sigal, Alexandru O. Balan, Michael J. Black
ITIIS
2010
240views more  ITIIS 2010»
14 years 10 months ago
Super-Resolution Iris Image Restoration using Single Image for Iris Recognition
Iris recognition is a biometric technique which uses unique iris patterns between the pupil and sclera. The advantage of iris recognition lies in high recognition accuracy; howeve...
Kwang Yong Shin, Byung Jun Kang, Kang Ryoung Park
ICPPW
2009
IEEE
14 years 9 months ago
A Scalable Parallel Approach for Peptide Identification from Large-Scale Mass Spectrometry Data
Identifying peptides, which are short polymeric chains of amino acid residues in a protein sequence, is of fundamental importance in systems biology research. The most popular appr...
Gaurav Ramesh Kulkarni, Ananth Kalyanaraman, Willi...
TCS
2011
14 years 6 months ago
On the relationship between fuzzy and Boolean cellular automata
Fuzzy cellular automata (FCA) are continuous cellular automata where the local rule is defined as the “fuzzification" of the local rule of a corresponding Boolean cellula...
Heather Betel, Paola Flocchini
« Prev « First page 1470 / 1512 Last » Next »