Sciweavers

443 search results - page 38 / 89
» Testing for Software Vulnerability Using Environment Perturb...
Sort
View
I3E
2001
196views Business» more  I3E 2001»
15 years 1 months ago
Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications
: Designing security-critical systems correctly is very difficult. We present work on software engineering of security critical systems, supported by the CASE tool AUTOFOCUS. Secur...
Jan Jürjens, Guido Wimmel
ICDAR
2009
IEEE
14 years 9 months ago
Learning on the Fly: Font-Free Approaches to Difficult OCR Problems
Despite ubiquitous claims that optical character recognition (OCR) is a "solved problem," many categories of documents continue to break modern OCR software such as docu...
Andrew Kae, Erik G. Learned-Miller
TITS
2002
103views more  TITS 2002»
14 years 11 months ago
Artificial vision in extreme environments for snowcat tracks detection
This paper describes the image processing techniques designed to localize the tracks of snowcats for the automation of transportation of goods and people during the Italian scienti...
Alberto Broggi, Alessandra Fascioli
BMCBI
2010
179views more  BMCBI 2010»
14 years 12 months ago
A semi-supervised learning approach to predict synthetic genetic interactions by combining functional and topological properties
Background: Genetic interaction profiles are highly informative and helpful for understanding the functional linkages between genes, and therefore have been extensively exploited ...
Zhuhong You, Zheng Yin, Kyungsook Han, De-Shuang H...
VEE
2012
ACM
269views Virtualization» more  VEE 2012»
13 years 7 months ago
SimTester: a controllable and observable testing framework for embedded systems
In software for embedded systems, the frequent use of interrupts for timing, sensing, and I/O processing can cause concurrency faults to occur due to interactions between applicat...
Tingting Yu, Witawas Srisa-an, Gregg Rothermel