Critical software most often requires an independent validation and verification (IVV). IVV is usually performed by domain experts, who are not familiar with specific, many times ...
The paper considers an interactive search paradigm in which at each round a user is presented with a set of k images and is required to select one that is closest to her target. P...
Recognition systems have generally treated specular highlights as noise. We show how to use these highlights as a positive source of information that improves recognition of shiny...
Margarita Osadchy, David W. Jacobs, Ravi Ramamoort...
This paper shows how software engineering technologies used to define and analyze complex software systems can also be effective in detecting defects in human-intensive processes ...
Bin Chen, George S. Avrunin, Elizabeth A. Henneman...
Expertise locator systems have been designed to help find experts within organizations. While there are many examples of these systems in the literature, there has not been any sy...