Sciweavers

5722 search results - page 976 / 1145
» Security Function Interactions
Sort
View
106
Voted
ECCV
2004
Springer
15 years 9 months ago
A Fourier Theory for Cast Shadows
—Cast shadows can be significant in many computer vision applications, such as lighting-insensitive recognition and surface reconstruction. Nevertheless, most algorithms neglect ...
Ravi Ramamoorthi, Melissa L. Koudelka, Peter N. Be...
120
Voted
EMSOFT
2004
Springer
15 years 9 months ago
Conservative approximations for heterogeneous design
Embedded systems are electronic devices that function in the context of a real environment, by sensing and reacting to a set of stimuli. Because of their close interaction with th...
Roberto Passerone, Jerry R. Burch, Alberto L. Sang...
140
Voted
GECCO
2004
Springer
15 years 9 months ago
Limit Cycle Prediction in Multivariable Nonlinear Systems Using Genetic Algorithms
Abstract. This paper presents an intelligent method based on multiuobjective genetic algorithm (MOGA) for prediction of limit cycle in multivariable nonlinear systems. First we add...
Farzan Rashidi, Mehran Rashidi
118
Voted
MKM
2004
Springer
15 years 8 months ago
Integrated Semantic Browsing of the Mizar Mathematical Library for Authoring Mizar Articles
Abstract. The Mizar system is equipped with a very large library containing tens of thousands of theorems and thousands of definitions, which often use overloaded notation. For e...
Grzegorz Bancerek, Josef Urban
RE
2004
Springer
15 years 8 months ago
Identifying Stakeholders and Their Preferences about NFR by Comparing Use Case Diagrams of Several Existing Systems
We present a method to identify stakeholders and their preferences about non-functional requirements (NFR) by using use case diagrams of existing systems. We focus on the changes ...
Haruhiko Kaiya, Akira Osada, Kenji Kaijiri