Sciweavers

1092 search results - page 47 / 219
» aime 2009
Sort
View
FASE
2009
Springer
15 years 4 months ago
A Formal Connection between Security Automata and JML Annotations
Security automata are a convenient way to describe security policies. Their typical use is to monitor the execution of an application, and to interrupt it as soon as the security p...
Marieke Huisman, Alejandro Tamalet
ICALP
2009
Springer
15 years 4 months ago
Assigning Papers to Referees
Refereed conferences require every submission to be reviewed by members of a program committee (PC) in charge of selecting the conference program. There are many software packages...
Kurt Mehlhorn
ICIAP
2009
ACM
15 years 4 months ago
Dense Two-Frame Stereo Correspondence by Self-organizing Neural Network
This work aims at defining an extension of a competitive method for matching correspondences in stereoscopic image analysis. The method we extended was proposed by Venkatesh, Y.V....
Marco Vanetti, Ignazio Gallo, Elisabetta Binaghi
ICSE
2009
IEEE-ACM
15 years 4 months ago
JUnitMX - A change-aware unit testing tool
Developers use unit testing to improve the quality of software systems. Current development tools for unit testing help to automate test execution, to report results, and to gener...
Jan Wloka, Barbara G. Ryder, Frank Tip
PAKDD
2009
ACM
115views Data Mining» more  PAKDD 2009»
15 years 4 months ago
Data Mining for Intrusion Detection: From Outliers to True Intrusions
Data mining for intrusion detection can be divided into several sub-topics, among which unsupervised clustering has controversial properties. Unsupervised clustering for intrusion...
Goverdhan Singh, Florent Masseglia, Céline ...