Sciweavers

3706 search results - page 461 / 742
» The Transformational Approach to Program Development
Sort
View
VSTTE
2012
Springer
14 years 13 days ago
Infeasible Code Detection
A piece of code in a computer program is infeasible if it cannot be part of any normally-terminating execution of the program. We develop an algorithm for the automatic detection o...
Cristiano Bertolini, Martin Schäf, Pascal Sch...
OOPSLA
2007
Springer
15 years 11 months ago
Modular typestate checking of aliased objects
Objects often define usage protocols that clients must follow in order for these objects to work properly. Aliasing makes it notoriously difficult to check whether clients and i...
Kevin Bierhoff, Jonathan Aldrich
VMCAI
2005
Springer
15 years 10 months ago
On the Complexity of Error Explanation
When a system fails to satisfy its specification, the model checker produces an error trace (or counter-example) that demonstrates an undesirable behavior, which is then used in d...
Nirman Kumar, Viraj Kumar, Mahesh Viswanathan
CVPR
2009
IEEE
17 years 47 min ago
Maximizing Intra-individual Correlations for Face Recognition Across Pose Differences
The variations of pose lead to significant performance decline in face recognition systems, which is a bottleneck in face recognition. A key problem is how to measure the simila...
Annan Li (Chinese Academy of Sciences), Shiguang S...
SIGMOD
2006
ACM
232views Database» more  SIGMOD 2006»
16 years 5 months ago
High-performance complex event processing over streams
In this paper, we present the design, implementation, and evaluation of a system that executes complex event queries over real-time streams of RFID readings encoded as events. The...
Eugene Wu 0002, Yanlei Diao, Shariq Rizvi