Sciweavers

3792 search results - page 697 / 759
» Techniques for Trusted Software Engineering
Sort
View

Publication
383views
16 years 18 days ago
Hunting Nessie -- Real-Time Abnormality Detection from Webcams
We present a data-driven, unsupervised method for unusual scene detection from static webcams. Such time-lapse data is usually captured with very low or varying framerate. This ...
Michael D. Breitenstein, Helmut Grabner, Luc Van G...

Publication
455views
15 years 9 months ago
General road detection from a single image
Given a single image of an arbitrary road, that may not be well-paved, or have clearly delineated edges, or some a priori known color or texture distribution, is it possible for a ...
Hui Kong, Jean-Yves Audibert, and Jean Ponce
110
Voted
CHI
2010
ACM
15 years 7 months ago
Example-centric programming: integrating web search into the development environment
The ready availability of online source code examples has changed the cost structure of programming by example modification. However, current search tools are wholly separate from...
Joel Brandt, Mira Dontcheva, Marcos Weskamp, Scott...
SAC
2009
ACM
15 years 7 months ago
A passive conformance testing approach for a MANET routing protocol
In this paper we propose a passive conformance testing technique applied to a Mobile ad hoc network (MANET) routing protocol, OLSR, that is characterized by a dynamically changing...
Ana R. Cavalli, Stéphane Maag, Edgardo Mont...
96
Voted
FOSSACS
2009
Springer
15 years 7 months ago
Reactive Systems, Barbed Semantics, and the Mobile Ambients
Reactive systems, proposed by Leifer and Milner, represent a meta-framework aimed at deriving behavioral congruences for those specification formalisms whose operational semantics...
Filippo Bonchi, Fabio Gadducci, Giacoma Valentina ...