This paper presents a temporal model for the coverage achieved by software testing. The proposed model, which is applicable at any level of the testing hierarchy, can determine th...
In this paper, we present a scheme for face authentication in the presence of variations. To deal with variations, such as facial expressions and registration errors, with which t...
Xiaoming Liu 0002, Tsuhan Chen, B. V. K. Vijaya Ku...
With the advent of computational grids, networking performance over the wide-area network (WAN) has become a critical component in the grid infrastructure. Unfortunately, many hig...
This paper investigates the use of programming language constructs to realize adaptive behavior in support of collaboration among users of wearable and handheld computers. A proto...
Philip K. McKinley, Seyed Masoud Sadjadi, Eric P. ...
Machine code disassembly routines form a fundamental component of software systems that statically analyze or modify executable programs. The task of disassembly is complicated by...
Benjamin Schwarz, Saumya K. Debray, Gregory R. And...