Sciweavers

1466 search results - page 162 / 294
» Completeness of the Authentication Tests
Sort
View
WSC
2007
13 years 10 months ago
Simulation results and formalism for global-local scheduling in semiconductor manufacturing facilities
This article deals with an approach for managing scheduling in semiconductor manufacturing facilities. The proposed approach ensures consistency between global and local schedulin...
Mickaël Bureau, Stéphane Dauzèr...
ADAEUROPE
2007
Springer
13 years 9 months ago
Automatic Ada Code Generation Using a Model-Driven Engineering Approach
Currently, Model-Driven Engineering (MDE) is considered one of the most promising approaches for software development. In this paper, a simple but complete example based on state-m...
Diego Alonso, Cristina Vicente-Chicote, Pedro S&aa...
ICA
2007
Springer
13 years 9 months ago
Gradient Convolution Kernel Compensation Applied to Surface Electromyograms
Abstract. This paper introduces gradient based method for robust assessment of the sparse pulse sources, such as motor unit innervation pulse trains in the filed of electromyograp...
Ales Holobar, Damjan Zazula
AAAI
2010
13 years 9 months ago
How Incomplete Is Your Semantic Web Reasoner?
Conjunctive query answering is a key reasoning service for many ontology-based applications. In order to improve scalability, many Semantic Web query answering systems give up com...
Giorgos Stoilos, Bernardo Cuenca Grau, Ian Horrock...
ACL
2007
13 years 9 months ago
Chinese Segmentation with a Word-Based Perceptron Algorithm
Standard approaches to Chinese word segmentation treat the problem as a tagging task, assigning labels to the characters in the sequence indicating whether the character marks a w...
Yue Zhang 0004, Stephen Clark