Search For:

Displaying 1-50 out of 232 total
SPLEMMA: a generic framework for controlled-evolution of software product lines
Found in: Proceedings of the 17th International Software Product Line Conference co-located workshops (SPLC '13 Workshops)
By Clément Quinton, Daniel Romero, Laurence Duchien, Mireille Blay-Fornarino, Philippe Collet, Sébastien Mosser, Simon Urli
Issue Date:August 2013
pp. 59-66
Managing in a generic way the evolution process of feature-oriented Software Product Lines (spls) is complex due to the number of elements that are impacted and the heterogeneity of the spls regarding artifacts used to define them. Existing work presents s...
Cardinality-based feature models with constraints: a pragmatic approach
Found in: Proceedings of the 17th International Software Product Line Conference (SPLC '13)
By Clément Quinton, Daniel Romero, Laurence Duchien
Issue Date:August 2013
pp. 162-166
Feature models originating from Software Product Line Engineering are a well-known approach to variability modeling. In many situations, the variability does not apply only on features but also on the number of times these features can be cloned. In such a...
Found in: ACM SIGGRAPH 2013 Computer Animation Festival (SIGGRAPH '13)
By Clément Lauricella
Issue Date:July 2013
pp. 1-1
Barney lives with his father, Walter, in a little suburban house. He tries to live a normal life even though Barney is different: his sense of gravity is inverted.
Open government data: a value chain model proposal
Found in: Proceedings of the 14th Annual International Conference on Digital Government Research (dg.o '13)
By Cláudio Sonáglio Albano
Issue Date:June 2013
pp. 285-286
Open Government Data (OGD) is a technology platform adopted by governments to meet new society demands. This theme is based on the assumptions of transparency, collaboration and participation. It is believed that from these initiatives, it is possible to g...
Simultaneous computation of the row and column rank profiles
Found in: Proceedings of the 38th international symposium on International symposium on symbolic and algebraic computation (ISSAC '13)
By Clément Pernet, Jean-Guillaume Dumas, Ziad Sultan
Issue Date:June 2013
pp. 181-188
Gaussian elimination with full pivoting generates a PLUQ matrix decomposition. Depending on the strategy used in the search for pivots, the permutation matrices can reveal some information about the row or the column rank profiles of the matrix. We propose...
Reading with a digital roll
Found in: CHI '13 Extended Abstracts on Human Factors in Computing Systems (CHI EA '13)
By Clément Pillias, Pierre Cubaud, Shuo Hsiu Hsu
Issue Date:April 2013
pp. 1377-1382
We introduce the Digital Roll, a cylindrical hand-held device wrapped with a curved display, that can be rotated by hand to provide a continuous scrolling of text. We present design considerations for such a device and report on a preliminary experiment de...
Ensuring consistency of feature-based decisions with a business rule system
Found in: Proceedings of the Seventh International Workshop on Variability Modelling of Software-intensive Systems (VaMoS '13)
By Cláudia M. L. Werner, Fabio P. Basso, Raquel M. Pillat, Toacy C. Oliveira
Issue Date:January 2013
pp. 1-8
Feature Models are widely used in some domains to represent variabilities and support decisions that configure a specific combination of domain elements. A feature configuration is created by selecting a features set that satisfies constraints imposed by t...
FlyVIZ: a novel display device to provide humans with 360° vision by coupling catadioptric camera with hmd
Found in: Proceedings of the 18th ACM symposium on Virtual reality software and technology (VRST '12)
By Anatole Lécuyer, Clément Riant, Eric Marchand, Jérôme Ardouin, Maud Marchal
Issue Date:December 2012
pp. 41-44
Have you ever dreamed of having eyes in the back of your head? In this paper we present a novel display device called FlyVIZ which enables humans to experience a real-time 360° vision of their surroundings for the first time. To do so, we combine a pa...
A declarative approach for software compositional reconfiguration
Found in: Proceedings of the 11th International Workshop on Adaptive and Reflective Middleware (ARM '12)
By Cláudia Maria Lima Werner, Marco Eugênio Madeira Di Beneditto
Issue Date:December 2012
pp. 1-6
Considering software developed in a component based fashion, one important aspect about software reconfiguration is to decide how to change the software structure. In some applications, to manually describe the reconfiguration plan to be executed can be a ...
Adaptive load-balancing for MMOG servers using KD-trees
Found in: Computers in Entertainment (CIE)
By Carlos Eduardo B. Bezerra, Cláudio F. R. Geyer, João L. D. Comba
Issue Date:October 2012
pp. 1-16
In massively multiplayer online games (MMOGs) there is a great demand for high bandwidth connections with irregular access patterns. Such irregular demand is because players, who can vary from a few hundred to several tens of thousands, often occupy the vi...
Interactive Quadrangulation with Reeb Atlases and Connectivity Textures
Found in: IEEE Transactions on Visualization and Computer Graphics
By Julien Tierny,Joel Daniels II,Luis Gustavo Nonato,Valerio Pascucci,Cláudio T. Silva
Issue Date:October 2012
pp. 1650-1663
Creating high-quality quad meshes from triangulated surfaces is a highly nontrivial task that necessitates consideration of various application specific metrics of quality. In our work, we follow the premise that automatic reconstruction techniques may not...
Testing type class laws
Found in: Proceedings of the 2012 symposium on Haskell symposium (Haskell '12)
By Cláudio Amaral, Johan Jeuring, Patrik Jansson
Issue Date:September 2012
pp. 49-60
The specification of a class in Haskell often starts with stating, in comments, the laws that should be satisfied by methods defined in instances of the class, followed by the type of the methods of the class. This paper develops a framework that supports ...
Sparse polynomial interpolation and Berlekamp/Massey algorithms that correct outlier errors in input values
Found in: Proceedings of the 37th International Symposium on Symbolic and Algebraic Computation (ISSAC '12)
By Clément Pernet, Erich L. Kaltofen, Matthew T. Comer
Issue Date:July 2012
pp. 138-145
We propose algorithms performing sparse interpolation with errors, based on Prony's--Ben-Or's & Tiwari's algorithm, using a Berlekamp/Massey algorithm with early termination. First, we present an algorithm that can recover a t-sparse polynomial f from ...
Counting occurrences for a finite set of words: Combinatorial methods
Found in: ACM Transactions on Algorithms (TALG)
By Frédérique Bassino, Julien Clément, Pierre Nicodème
Issue Date:July 2012
pp. 1-28
In this article, we provide the multivariate generating function counting texts according to their length and to the number of occurrences of words from a finite set. The application of the inclusion-exclusion principle to word counting due to Goulden and ...
Level and pressure control in condenser of the <sup>13</sup>C isotope separation column
Found in: International Conference on Automation, Quality and Testing, Robotics
By Cl. Festila, E. H. Dulf, A. Baldea
Issue Date:May 2010
pp. 1-6
The process of the <sup>13</sup>C in cryogenic separation column is an intricate one. A lot of parameters must be kept constant at empirical values. From among these, the nitrogen level and the temperature in condenser are essential for the sep...
Engine control system for multiple combustion modes
Found in: International Conference on Automation, Quality and Testing, Robotics
By D. Bonta, V. Tulbure, Cl. Festila
Issue Date:May 2008
pp. 470-472
To reduce the emission by Diesel-engine in railway traction, continuous development and innovation in combustion, sensing net, control method and strategies are required to met the legal requirements. Multiple combustion modes by Diesel engines can reduce ...
Estimator based flooding predictor for (<sup>13</sup>C) cryogenic separation column
Found in: International Conference on Automation, Quality and Testing, Robotics
By C.I. Pop, E.H. Dulf, Cl. Festila
Issue Date:May 2008
pp. 207-210
The industrial distillation plants- like those for crude oil- and the cryogenic distillation column for (<sup>13</sup>C) isotope enrichment have in common the probability to appear an undesirable phenomenon: the flooding, when the plant efficie...
Flooding process analysis by <sup>13</sup>C cryogenic separation column
Found in: International Conference on Automation, Quality and Testing, Robotics
By Cl. Festila, C. I. Pop, E. H. Dulf, A. Baldea, M. Gligan
Issue Date:May 2008
pp. 96-99
The applications of stable isotopes from different chemical elements are well-known. Based on specific properties, a great diversity of isotope concentration (separation) methods have been developed, one of them being the cryogenic separation for (<sup&...
Three-phase power supplying system for induction motor of the diesel-electric locomotive
Found in: International Conference on Automation, Quality and Testing, Robotics
By M. Huzau, Eva-Henrietta Dulf, V. Tulbure, Cl. Festila
Issue Date:May 2008
pp. 479-482
In the railway traction systems, an important role play Diesel-electric locomotive. The AC traction motor proves its advantages compared to the DC older motor, but the supply (the power inverter) is more sophisticated and expensive and, in many cases, not ...
Model Predictive Control of (15N) Isotope Separation Column
Found in: International Conference on Automation, Quality and Testing, Robotics
By E.H. Dulf, Cl. Festila
Issue Date:May 2006
pp. 163-166
The chemical processes developed in the <sup>15</sup>N-isotope separation plant are very complex and many details are not yet known in totality. The authors are concerned with the problem of developing effective and readily implemental techniqu...
Mining Emerging Substrings
Found in: Database Systems for Advanced Applications, International Conference on
By Sarah Chan, Ben Kao, C.L. Yip, Michael Tang
Issue Date:March 2003
pp. 119
We introduce a new type of KDD patterns called emerging substrings. In a sequence database, an emerging substring (ES) of a data class is a substring which occurs more frequently in that class rather than in other classes. ESs are important to sequence cla...
A Robotic Teacher of Chinese Handwriting
Found in: Haptic Interfaces for Virtual Environment and Teleoperator Systems, International Symposium on
By Cl Teo, E. Burdet, Hp Lim
Issue Date:March 2002
pp. 335
We introduce a virtual teaching system for Chinese ideograms that guides movement by haptic and visual. A powerful 6DOF haptic interface and reflection of the image ensure transparent virtual manipulation with undistorted hand-eye coordination. The guidanc...
An Introduction to Evaluating Biometric Systems
Found in: Computer
By P. Jonathon Phillips, Alvin Martin, C.l. Wilson, Mark Przybocki
Issue Date:February 2000
pp. 56-63
<p>On the basis of media hype alone, you might conclude that biometric passwords will soon replace their alphanumeric counterparts with versions that cannot be stolen, forgotten, lost, or given to another person. But what if the actual performance of...
Partial Scan with Preselected Scan Signals
Found in: IEEE Transactions on Computers
By Peichen Pan, C.l. Liu
Issue Date:September 1999
pp. 1000-1005
<p><b>Abstract</b>—This paper deals with partial scan approaches that select scan signals oblivious to the availability of flip-flops (FFs). Such approaches can greatly reduce the number of scan signals since maximum freedom is presented ...
Minimax relations for T-join packing problems
Found in: Theory of Computing Systems, Israel Symposium on the
By J. Cohen, C.L. Lucchesi
Issue Date:June 1997
pp. 38
In this paper we present structural and algorithmic results for problems involving the packing of T-joins. We explore minimax relations that relate the size of a packing of T-joins with the size of a minimum T-cut in a graph. We present a new conjecture st...
Switching Codes for Delta-I Noise Reduction
Found in: IEEE Transactions on Computers
By C.l. Chen, Brian W. Curran
Issue Date:September 1996
pp. 1017-1021
<p><b>Abstract</b>—In this paper, we address the off-chip driver delta-I or switching noise problem. We propose a novel approach based on switching codes to reduce this noise. These codes are designed to lower the number of drivers which ...
Joint target angle and Doppler estimation with fractional lower-order statistics for airborne radar
Found in: Signal Processing Workshop on Statistical Signal and Array Processing, IEEE
By P. Tsakalides, C.L. Nikias
Issue Date:June 1996
pp. 70
We introduce a new joint spatial- and Doppler-frequency high-resolution estimation technique based on the fractional lower-order statistics of the measurements of a radar array. We define the covariation matrix of the space-time radar observation vector pr...
Layout synthesis for datapath designs
Found in: European Design Automation Conference with EURO-VHDL
By N. Buddi, M. Chrzanowska-Jeske, C.L. Saxe
Issue Date:September 1995
pp. 86
DPLAYOUT is a layout synthesis tool for bit-sliced datapath designs targeting standard-cell libraries. We developed fast and efficient heuristics for placing the cells in a bit-slice, such that the regularity of datapath circuits is presented and the numbe...
An Efficient Method for Hierarchically and Dynamically Extracting Text Strings from Mixed Text/Graphics Images
Found in: Document Analysis and Recognition, International Conference on
By S. He, N. Abe, Cl. Tan
Issue Date:August 1995
pp. 265
No summary available.
A multibaseline stereo system with active illumination and real-time image acquisition
Found in: Computer Vision, IEEE International Conference on
By Sing Bing Kang, J.A. Webb, C.L. Zitnick, T. Kanade
Issue Date:June 1995
pp. 88
We describe our implementation of a parallel depth recovery scheme for a four-camera multibaseline stereo in a convergent configuration. Our system is capable of image capture at video rate. This is critical in applications that require three-dimensional t...
On blind channel identification for impulsive signal environments
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By Xinyu Ma, C.L. Nikias
Issue Date:May 1995
pp. 1992-1995
New methods for parameter estimation and blind system identification for impulsive signal environments are presented. The data are modeled as stable processes. First, methods for estimating the parameters (characteristic exponent and dispersion) of a symme...
A new eigenvector-based algorithm for multichannel blind deconvolution of input colored signals
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By M.I. Gurelli, C.L. Nikias
Issue Date:April 1993
pp. 448-451
The development of a new algorithm is presented for the deconvolution of an unknown, possibly colored signal which is observed through two or more unknown channels described by rational system transfer functions. It is assumed that the channel orders as we...
Symbol Error-Correcting Codes for Computer Memory Systems
Found in: IEEE Transactions on Computers
By C.L. Chen
Issue Date:February 1992
pp. 252-256
<p>A method is presented of constructing symbol error correcting codes that have a minimum symbol distance of 4. The method yields some codes that are more efficient than previously known codes. The application is to designing fault-tolerant semicond...
Exhaustive Test Pattern Generation Using Cyclic Codes
Found in: IEEE Transactions on Computers
By C.L. Chen
Issue Date:February 1988
pp. 225-228
The generation of exhaustive test patterns for VLSI circuits using linear feedback shift registers is described in terms of cyclic codes. Punctured cyclic codes are used to generate exhaustive test patterns of any length. A techniques for the generation of...
Deadlock-Free Message Routing in Multiprocessor Interconnection Networks
Found in: IEEE Transactions on Computers
By W.J. Dally, C.L. Seitz
Issue Date:May 1987
pp. 547-553
A deadlock-free routing algorithm can be generated for arbitrary interconnection networks using the concept of virtual channels. A necessary and sufficient condition for deadlock-free routing is the absence of cycles in a channel dependency graph. Given an...
Augmenting Ada for SIMD Parallel Processing
Found in: IEEE Transactions on Software Engineering
By C.L. Cline, H.J. Siegel
Issue Date:September 1985
pp. 970-977
In order to program SIMD (single instruction stream-multiple data stream) parallel machines used for tasks such as speech and image processing, a language with explicit parallel constructs is often desirable. The language Ada, developed by the Department o...
An Approach for the Realization of Threshold Functions of Order r
Found in: IEEE Transactions on Computers
By H.R. Hwa, C.L. Sheng
Issue Date:October 1969
pp. 923-939
In this paper we shall study the problem of nonlinear separation. As usual, a Boolean function F of n binary variables, x<inf>l</inf>,., x<inf>n</inf>, x<inf>i</inf>S{1,0}, i=1,., n, will be represented by a set of verti...
Logic Hazards in Threshold Networks
Found in: IEEE Transactions on Computers
By A.B. Howe, C.L. Coates
Issue Date:March 1968
pp. 238-251
Abstract?This paper is concerned with the study of logic hazards in threshold gate networks. Eichelberger has proved that logic hazards are not present in a sum-of-product (product-of-sum) realization which realizes all of the 1(0) prime implicants of the ...
Discovery of Temporal Associations in Multivariate Time Series
Found in: IEEE Transactions on Knowledge and Data Engineering
By Dennis E.H. Zhuang,Gary C.L. Li,Andrew K. C. Wong
Issue Date:December 2014
pp. 2969-2982
Multivariate time series are common in many application domains, particularly in industrial processes with a large number of sensors installed for process monitoring and control. Often, such data encapsulate complex relations among individual series. This ...
A New Laplacian Method for Arbitrarily-Oriented Word Segmentation in Video
Found in: 2014 11th IAPR International Workshop on Document Analysis Systems (DAS)
By P. Shivakumara,M. Suhil,D.S. Guru,C.L. Tan
Issue Date:April 2014
pp. 339-343
Word segmentation from video text line is challenging because video poses several challenges, such as complex background, low resolution, arbitrary orientation, etc. Besides, word segmentation is essential for improving text recognition accuracy. Therefore...
Separation of Graphics (Superimposed) and Scene Text in Video Frames
Found in: 2014 11th IAPR International Workshop on Document Analysis Systems (DAS)
By P. Shivakumara,N.V. Kumar,D.S. Guru,C.L. Tan
Issue Date:April 2014
pp. 344-348
The presence of both graphics and scene text in video frames makes text detection and recognition problem more challenging because the nature of the two texts differs significantly. This paper aims to propose a novel method for separation of graphics and s...
Detection of Curved Text in Video: Quad Tree Based Method
Found in: 2013 12th International Conference on Document Analysis and Recognition (ICDAR)
By P. Shivakumara,H.T. Basavaraju,D.S. Guru,C.L. Tan
Issue Date:August 2013
pp. 594-598
In this paper, we address curved text detection in video through a new enhancement criterion and the use of quad tree. The proposed method makes use of the quad tree to simplify the task of handling the entire frame at each stage. The proposed method emplo...
Applying genetic algorithms to data selection for SQL mutation analysis
Found in: Proceeding of the fifteenth annual conference companion on Genetic and evolutionary computation conference companion (GECCO '13 Companion)
By Ana C.L. Monção, Auri M.R. Vincenzi, Cassio L. Rodrigues, Celso G. Camilo-Jr, Leonardo T. Queiroz, Plínio de Sá Leitão-Jr
Issue Date:July 2013
pp. 207-208
This paper presents an approach to Structured Query Language (SQL) instruction tests via Mutation Analysis that uses Evolutionary Algorithms (GA) to select data to be used in the assessment of mutants. Based on a heuristic perspective, our aim is to select...
Registering Drosophila embryos at cellular resolution to build a quantitative 3D atlas of gene expression patterns and morphology
Found in: 2005 IEEE Computational Systems Bioinformatics Conference Workshops and Poster Abstracts
By C.C. Fowlkes,C.L. Luengo Hendriks,S.V.E. Keranen,M.D. Biggin,D.W. Knowles,D. Sudar,J. Malik
Issue Date:April 2013
pp. 354,355,356,357
The Berkeley Drosophila Transcription Network Project is developing a suite of methods to convert volumetric data generated by confocal fluorescence microscopy into numerical three dimensional representations of gene expression at cellular resolution. One ...
The spoofax name binding language
Found in: Proceedings of the 3rd annual conference on Systems, programming, and applications: software for humanity (SPLASH '12)
By Eelco Visser, Gabriël D.P. Konat, Guido H. Wachsmuth, Lennart C.L. Kats, Vlad A. Vergu
Issue Date:October 2012
pp. 79-80
In textual software languages, names are used to identify program elements such as variables, methods, and classes. Name analysis algorithms resolve names in order to establish references between definitions and uses of names. In this poster, we present th...
Software development environments on the web: a research agenda
Found in: Proceedings of the ACM international symposium on New ideas, new paradigms, and reflections on programming and software (Onward! '12)
By Eelco Visser, Karl Trygve Kalleberg, Lennart C.L. Kats, Richard G. Vogelij
Issue Date:October 2012
pp. 99-116
Software is rapidly moving from the desktop to the Web. The Web provides a generic user interface that allows ubiquitous access, instant collaboration, integration with other online services, and avoids installation and configuration on desktop computers. ...
Efficient Optimization of Common Base Domains for Cross Parameterization
Found in: IEEE Transactions on Visualization and Computer Graphics
By Tsz-Ho Kwok,Yunbo Zhang,Charlie C.L. Wang
Issue Date:October 2012
pp. 1678-1692
Given a set of corresponding user-specified anchor points on a pair of models having similar features and topologies, the cross parameterization technique can establish a bijective mapping constrained by the anchor points. In this paper, we present an effi...
Authentication and Access Control in the Internet of Things
Found in: 2012 32nd International Conference on Distributed Computing Systems Workshops (ICDCS Workshops)
By Jing Liu,Yang Xiao,C.L. Philip Chen
Issue Date:June 2012
pp. 588-592
Due to the inherent vulnerabilities of the Internet, security and privacy issues should be considered and addressed before the Internet of Things is widely deployed. This paper mainly analyzes existing authentication and access control methods, and then, i...
On the Use of Data Mining Tools for Data Preparation in Classification Problems
Found in: Computer and Information Science, ACIS International Conference on
By Paulo M. Gonçalves Jr.,Roberto S.M. Barros,Davi C.L. Vieira
Issue Date:June 2012
pp. 173-178
The data preparation phase is a critical step in the KDD (Knowledge Discovery in Databases) process. This phase is crucial for a good data mining result because if data is not correctly prepared, all the next phases of the process are compromised. DMPML is...
An Architecture Using a Finite Difference Method to Calculate Realistic Sound Equalization in Games
Found in: 2011 Brazilian Symposium on Games and Digital Entertainment (SBGAMES)
By B. Moreira,D.N. Brandao,E.W.C. Gonzales,M. Kischinhevsky,C.L. Kuryla
Issue Date:November 2011
pp. 70-78
Most games and other interactive virtual environments focus on rendering natural phenomena in the most believable manner by using accurate visuals and physics. However, not much effort has been put into accounting for the physics of sound. The simulation o...
 1  2 Next >>