Sciweavers

411 search results - page 70 / 83
» Automating the Dependency Pair Method
Sort
View
ICECCS
2009
IEEE
161views Hardware» more  ICECCS 2009»
14 years 5 months ago
Formal Modelling and Analysis of Business Information Applications with Fault Tolerant Middleware
Distributed information systems are critical to the functioning of many businesses; designing them to be dependable is a challenging but important task. We report our experience i...
Jeremy Bryans, John S. Fitzgerald, Alexander Roman...
AI
2007
Springer
14 years 4 months ago
Learning the Semantic Meaning of a Concept from the Web
Many researchers have used text classification method in solving the ontology mapping problem. Their mapping results heavily depend on the availability of quality exemplars used as...
Yang Yu, Yun Peng
CCS
2007
ACM
14 years 4 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia
RSP
1999
IEEE
160views Control Systems» more  RSP 1999»
14 years 2 months ago
Mixed Abstraction Level Hardware Synthesis from SDL for Rapid Prototyping
SDL is currently gaining interest as a system level specification language for HW/SW codesign. Automated synthesis of SDL in hardware so far had problems with its efficiency. The ...
Oliver Bringmann, Wolfgang Rosenstiel, Annette Mut...
BIBM
2007
IEEE
139views Bioinformatics» more  BIBM 2007»
14 years 2 months ago
Automatic Identification of Temporal Sequences in Chewing Sounds
Chewing is an essential part of food intake. The analysis and detection of food patterns is an important component of an automatic dietary monitoring system. However chewing is a t...
Oliver Amft, Martin Kusserow, Gerhard Tröster