Applications of the Hough Transform (HT) have been limited to small-size images for a long time. For large-size images, peak detection and line verification become much more time-consuming. Many HT-based line detectio...
详细信息
Recognizing graphic objects from binary images is an important task in many real-life applications. Generally, there are two ways to do the graphics recognition: onestep methods and two-step methods. The former recogn...
详细信息
Recognizing graphic objects from binary images is an important task in many real-life applications. Generally, there are two ways to do the graphics recognition: one-step methods and two-step methods. The former recog...
详细信息
In this paper, we present a guided interaction approach for architectural design in a table-type VR environment (virtual table). By making it easier to communicate between two or more people in a virtual space, the vi...
详细信息
Modern enterprises are irreversibly dependent on large-scale, adaptive, component-based information systems whose complexity frequently exceeds current engineering capabilities for intellectual control, resulting in p...
详细信息
A previously unknown form of compromising emanations has been discovered. LED status indicators on data communication equipment, under certain conditions, are shown to carry a modulated optical signal that is signific...
详细信息
Process improvement studies have tended to focus on software process improvement (SPI) framework such as the generic „best practices" models (e.g., CMM and SPICE), SPI Models (e.g., PDCA and IDEAL), and Quality I...
详细信息
Formal methods, especially model checking, are an indispensable part of the softwareengineering process. With large software systems currently beyond the range of fully automatic verification, however, a combination ...
详细信息
Formal methods, especially model checking, are an indispensable part of the softwareengineering process. With large software systems currently beyond the range of fully automatic verification, however, a combination of decomposition and abstraction techniques is needed. To model check components of a system, a standard approach is to close the component with an abstraction of its environment. To make it useful in practice, the closing of the component should be automatic, both for data and for control abstraction. Specifically for model checking asynchronous open systems, external input queues should be removed, as they are a potential source of a combinatorial state explosion. In this paper we close a component synchronously by embedding the external environment directly into the system to avoid the external queues, while for the data, we use a two-valued abstraction, namely data influenced from the outside or not. This gives a more precise analysis than that investigated by Ioustinova et al. (2002). To further combat the state explosion problem, we combine this data abstraction with a static analysis to remove superfluous code fragments. The static analysis we use is reminiscent of that presented by Ioustinova et al., but we use a combination of a may and a must-analysis instead of a may-analysis.
The application of Hough Transform (HT) has been limited to small-size images for a long time. For large-size images, the peak detection and the line verification become much more time-consuming. Many HT-based line de...
详细信息
This paper discusses the development of softwareengineering class projects that have produced tools which have been used to enrich the educational experience of engineering students, the end users of the software. Th...
详细信息
This paper discusses the development of softwareengineering class projects that have produced tools which have been used to enrich the educational experience of engineering students, the end users of the software. The projects have involved the creation, maintenance and evolution of software that helps the students determine their major, understand their learning style, develop a semester-by-semester plan of study, and formulate a class schedule each semester. The evolution of the structure of the softwareengineering project process is first presented. Having "internal" clients (i.e. those who are employees of the university) for projects that directly benefit engineering students is then compared to having "external" clients. The benefits gained by all stakeholders through these projects and data supporting the satisfaction levels of those stakeholders is presented. Finally, there is a discussion of funded research projects that have been spun off from of these projects, and the plans for the further educational software development through these grants.
暂无评论