Sciweavers

6253 search results - page 1023 / 1251
» Use Case Modeling Guidelines
Sort
View
ISSTA
2010
ACM
15 years 6 months ago
Analysis of invariants for efficient bounded verification
SAT-based bounded verification of annotated code consists of translating the code together with the annotations to a propositional formula, and analyzing the formula for specifica...
Juan P. Galeotti, Nicolás Rosner, Carlos L&...
ECCV
2008
Springer
15 years 6 months ago
Active Matching
Abstract. In the matching tasks which form an integral part of all types of tracking and geometrical vision, there are invariably priors available on the absolute and/or relative i...
Margarita Chli, Andrew J. Davison
DIMVA
2007
15 years 5 months ago
A Study of Malcode-Bearing Documents
By exploiting the object-oriented dynamic composability of modern document applications and formats, malcode hidden in otherwise inconspicuous documents can reach third-party appli...
Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, ...
SDM
2010
SIAM
195views Data Mining» more  SDM 2010»
15 years 5 months ago
MACH: Fast Randomized Tensor Decompositions
Tensors naturally model many real world processes which generate multi-aspect data. Such processes appear in many different research disciplines, e.g, chemometrics, computer visio...
Charalampos E. Tsourakakis
148
Voted
LREC
2008
145views Education» more  LREC 2008»
15 years 5 months ago
BOEMIE Ontology-Based Text Annotation Tool
The huge amount of the available information in the Web creates the need of effective information extraction systems that are able to produce metadata that satisfy user's inf...
Pavlina Fragkou, Georgios Petasis, Aris Theodorako...
« Prev « First page 1023 / 1251 Last » Next »