DIKUL - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UL. Za polni dostop se PRIJAVITE.

2 3 4 5 6
zadetkov: 80.393
31.
  • Lot-to-lot reagent verifica... Lot-to-lot reagent verification: challenges and possible solutions
    Loh, Tze Ping; Sandberg, Sverre; Horvath, Andrea Rita Clinical chemistry and laboratory medicine, 04/2022, Letnik: 60, Številka: 5
    Journal Article
    Recenzirano

    Lot-to-lot verification is an important laboratory activity that is performed to monitor the consistency of analytical performance over time. In this opinion paper, the concept, clinical impact, ...
Celotno besedilo
Dostopno za: UL
32.
  • CHEX CHEX
    Lu, Long; Li, Zhichun; Wu, Zhenyu ... Proceedings of the 2012 ACM conference on Computer and communications security, 10/2012
    Conference Proceeding

    An enormous number of apps have been developed for Android in recent years, making it one of the most popular mobile operating systems. However, the quality of the booming apps can be a concern 4. ...
Celotno besedilo
Dostopno za: UL
33.
Celotno besedilo
34.
  • Cross-Generation Kinship Ve... Cross-Generation Kinship Verification with Sparse Discriminative Metric
    Wang, Shuyang; Ding, Zhengming; Fu, Yun IEEE transactions on pattern analysis and machine intelligence, 11/2019, Letnik: 41, Številka: 11
    Journal Article
    Recenzirano

    Kinship verification is a very important technique in many real-world applications, e.g., personal album organization, missing person investigation and forensic analysis. However, it is extremely ...
Celotno besedilo
Dostopno za: UL
35.
  • SM-DTW: Stability Modulated... SM-DTW: Stability Modulated Dynamic Time Warping for signature verification
    Parziale, Antonio; Diaz, Moises; Ferrer, Miguel A. ... Pattern recognition letters, 04/2019, Letnik: 121
    Journal Article
    Recenzirano
    Odprti dostop

    •SM-DTW is a weighted DTW algorithm based on the concept of stability regions and handwriting generation models.•Dissimilarities inside stability regions and similarities outside them are ...
Celotno besedilo
Dostopno za: UL
36.
  • A program verification base... A program verification based approach to find data race vulnerabilities in interrupt-driven program
    Feng, Haining 2020 35th IEEE/ACM International Conference on Automated Software Engineering (ASE), 12/2020
    Conference Proceeding

    The data race problem is common in the interrupt-driven program, and it is difficult to find as a result of complicated interrupt interleaving. Static analysis is a mainstream technology to detect ...
Celotno besedilo
Dostopno za: UL
37.
  • Prioritizing Test Inputs fo... Prioritizing Test Inputs for Deep Neural Networks via Mutation Analysis
    Wang, Zan; You, Hanmo; Chen, Junjie ... 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE), 05/2021
    Conference Proceeding

    Deep Neural Network (DNN) testing is one of the most widely-used ways to guarantee the quality of DNNs. However, labeling test inputs to check the correctness of DNN prediction is very costly, which ...
Celotno besedilo
Dostopno za: UL
38.
Celotno besedilo
Dostopno za: UL
39.
  • Discriminative Deep Metric ... Discriminative Deep Metric Learning for Face and Kinship Verification
    Lu, Jiwen; Hu, Junlin; Tan, Yap-Peng IEEE transactions on image processing, 2017-Sept., 2017-Sep, 2017-9-00, 20170901, Letnik: 26, Številka: 9
    Journal Article
    Recenzirano

    This paper presents a new discriminative deep metric learning (DDML) method for face and kinship verification in wild conditions. While metric learning has achieved reasonably good performance in ...
Celotno besedilo
Dostopno za: UL
40.
  • Dependable Software Systems... Dependable Software Systems Engineering
    Irlbeck, M; Peled, D; Pretschner, A 2015, 2015-05-26, Letnik: 40
    eBook

    We are all increasingly dependent on software systems to run the technology we use every day, so we need these systems to be both reliable and safe.This book presents papers from the NATO Advanced ...
Celotno besedilo
Dostopno za: UL
2 3 4 5 6
zadetkov: 80.393

Nalaganje filtrov