Sciweavers

715 search results - page 86 / 143
» Application of Formal Methods to the Development of a Softwa...
Sort
View
EMSOFT
2004
Springer
14 years 2 months ago
A model-based approach to integrating security policies for embedded devices
Embedded devices like smart cards can now run multiple interacting applications. A particular challenge in this domain is to dynamically integrate diverse security policies. In th...
Michael McDougall, Rajeev Alur, Carl A. Gunter
SSR
2001
104views more  SSR 2001»
13 years 10 months ago
Secure and efficient mobile agent application reuse using patterns
As wide-area open networks like the Internet and intranets grow larger, mobile agent technology is attracting more attention. Mobile agents are units of software that can deal wit...
Yasuyuki Tahara, Nobukazu Toshiba, Akihiko Ohsuga,...
TASLP
2010
130views more  TASLP 2010»
13 years 3 months ago
Developing Objective Measures of Foreign-Accent Conversion
Various methods have recently appeared to transform foreign-accented speech into its native-accented counterpart. Evaluation of these accent conversion methods requires extensive l...
Daniel Felps, Ricardo Gutierrez-Osuna
BIB
2008
88views more  BIB 2008»
13 years 9 months ago
MEGA: A biologist-centric software for evolutionary analysis of DNA and protein sequences
The Molecular Evolutionary Genetics Analysis (MEGA) software is a desktop application designed for comparative analysis of homologous gene sequences either from multigene families...
Sudhir Kumar, Masatoshi Nei, Joel Dudley, Koichiro...
RML
2002
140views Business» more  RML 2002»
13 years 8 months ago
UML as knowledge acquisition frontend for Semantic Web configuration knowledge bases
The trend towards highly specialized solution providers cooperatively offering configurable products and services to their customers requires the extension of current (standalone)...
Alexander Felfernig, Gerhard Friedrich, Dietmar Ja...