Sciweavers

87 search results - page 16 / 18
» Automatic Generation of Object Usage Specifications from Lar...
Sort
View
DSN
2006
IEEE
13 years 11 months ago
Using Attack Injection to Discover New Vulnerabilities
Due to our increasing reliance on computer systems, security incidents and their causes are important problems that need to be addressed. To contribute to this objective, the pape...
Nuno Ferreira Neves, João Antunes, Miguel C...
FLAIRS
2006
13 years 8 months ago
Cognitive Simulation in Virtual Patients
We present an overview of the Virtual Patient project at the University of Maryland, which is developing a cognitive model of humans experiencing various states of health and dise...
Sergei Nirenburg, Marjorie McShane, Stephen Beale,...
CA
1998
IEEE
13 years 11 months ago
MikeTalk: A Talking Facial Display Based on Morphing Visemes
We present MikeTalk, a text-to-audiovisual speech synthesizer which converts input text into an audiovisual speech stream. MikeTalk is built using visemes, which are a set of imag...
Tony Ezzat, Tomaso Poggio
DIALM
2010
ACM
194views Algorithms» more  DIALM 2010»
13 years 5 months ago
Prioritized gossip in vehicular networks
We present a method for using real world mobility traces to identify tractable theoretical models for the study of distributed algorithms in mobile networks. We validate the metho...
Alejandro Cornejo, Calvin C. Newport
ICSM
2005
IEEE
14 years 1 months ago
Context-Free Slicing of UML Class Models
In the work presented here, we introduce a method to automatically generate a subset of a UML class model based on a user-defined criterion. The goal of this work is to allow us to...
Huzefa H. Kagdi, Jonathan I. Maletic, Andrew Sutto...