Sciweavers

1104 search results - page 101 / 221
» A Comparison of State-Based Modelling Tools for Model Valida...
Sort
View
SIGSOFT
2007
ACM
14 years 9 months ago
Model checking service compositions under resource constraints
When enacting a web service orchestration defined using the Business Process Execution Language (BPEL) we observed various safety property violations. This surprised us considerab...
David S. Rosenblum, Howard Foster, Jeff Kramer, Je...
JSAC
2006
102views more  JSAC 2006»
13 years 8 months ago
A deterministic frequency-domain model for the indoor power line transfer function
The characterization of the transfer function of the power line (PL) channel is a nontrivial task that requires a truly interdisciplinary approach. Until recently, a common attribu...
S. Galli, Thomas C. Banwell
ACSAC
2004
IEEE
14 years 20 days ago
Reasoning About Complementary Intrusion Evidence
This paper presents techniques to integrate and reason about complementary intrusion evidence such as alerts generated by intrusion detection systems (IDSs) and reports by system ...
Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeve...
FM
2003
Springer
104views Formal Methods» more  FM 2003»
14 years 2 months ago
Proving the Shalls
Incomplete, inaccurate, ambiguous, and volatile requirements have plagued the software industry since its inception. The convergence of model-based development and formal methods o...
Steven P. Miller, Alan C. Tribble, Mats Per Erik H...
ICASSP
2011
IEEE
13 years 19 days ago
Syllabification of conversational speech using Bidirectional Long-Short-Term Memory Neural Networks
Segmentation of speech signals is a crucial task in many types of speech analysis. We present a novel approach at segmentation on a syllable level, using a Bidirectional Long-Shor...
Christian Landsiedel, Jens Edlund, Florian Eyben, ...