Margaria, B. Steffen (Eds.), Proceedings of the 4th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation, ISoLA'2010 (Heraclion, Crete), Part II, Vol. 6416...
An additional useful resource for implementing input validation in Java is theOWASPEnterprise SecurityAPI(ESAPI) that you can download atwww.owasp.org/index.php/ESAPI. ESAPI is a freely available reference implementation of security-related methods that you can use to build a secure application. ...
The goal of these efforts should be to improve the reliability of the computer software, the estimation of numerical accuracy, the quality of the physics models used, the quantification of uncertainty, and the training and expertise of users of the codes. In addition, new methods are critically...
Two estimation methods are used in the present research: a linear regression approach and a generalised linear mixed model (GLMM) approach. The linear regression approach is a two-stage process. In the first stage, a traditional IRT model (e.g. equation (1)) is fit to response data, and...
Nature Methods volume 18, pages 557–563 (2021)Cite this article 12k Accesses 239 Altmetric Metrics details Abstract Visualizing dynamic processes over large, three-dimensional fields of view at high speed is essential for many applications in the life sciences. Light-field microscopy (LFM) has ...
The third TFCV meeting in Dagstuhl addressed a subject which has been under intensive (and partly controversial) discussion in the computer vision community for several years. The evaluation and validation of computer vision algorithms and methods is of key importance, particularly for the configuration...
In AIDS, a normal model of the behavior of a computer system is created using machine learning, statistical-based or knowledge-based methods. Any significant deviation between the observed behavior and the model is regarded as an anomaly, which can be interpreted as an intrusion. This kind of ...
Optical methods to estimate LAI usually assume that leaves have infinitesimal size and are randomly distributed in the canopy volume (see section 3.3). However, actual canopy leaves have a finite dimension and are nonrandomly distributed in space (the clumping effect). Therefore, the “effective”...
Valid, “Validation methods and tools for knowledge-based systems,” Deliverable, Espirit II Valid Project 2148, 1988. Van De Burg, A.; Bachant, J.; and McDermott, J., “The taming of AI,”IEEE Expert, pp. 33—39, Fall 1986. ...
J. P. V. – Preparation and writing of the manuscript (Introduction, literature review, methods, and discussion). NBM: Wrote the data analysis section and analyzed the data. Dr. Mendoza also contributed in completing the discussion section and revision of the manuscript. Corresponding author Corre...