Sciweavers

6978 search results - page 119 / 1396
» Reframing Requirements Analysis
Sort
View
154
Voted
PAMI
2006
206views more  PAMI 2006»
15 years 4 months ago
Fast Active Appearance Model Search Using Canonical Correlation Analysis
A fast AAM search algorithm based on canonical correlation analysis (CCA-AAM) is introduced. It efficiently models the dependency between texture residuals and model parameters dur...
Rene Donner, Michael Reiter, Georg Langs, Philipp ...
SAC
2009
ACM
15 years 9 months ago
Towards "WYDIWYS" for MIMI using concept analysis
This paper presents a novel software engineering approach for developing a dynamic web interface that meets the quality criterion of “WYDIWYS” - What You Do Is What You See. T...
Jie Dai, Remo Mueller, Jacek Szymanski, Guo-Qiang ...
CADE
2008
Springer
16 years 5 months ago
Model Checking for Stability Analysis in Rely-Guarantee Proofs
Rely-guarantee (RG) reasoning is useful for modular Hoare-style proofs of concurrent programs. However, RG requires that assertions be proved stable under the actions of the enviro...
Hasan Amjad, Richard Bornat
121
Voted
WSC
2007
15 years 7 months ago
A Bayesian approach to analysis of limit standards
Limit standards are probabilistic requirements or benchmarks regarding the proportion of replications conforming or not conforming to a desired threshold. Sample proportions resul...
Roy R. Creasey Jr., K. Preston White Jr.
SIGADA
2004
Springer
15 years 10 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton