Sciweavers

568 search results - page 86 / 114
» Enforcing traceability in software
Sort
View
ENTCS
2007
118views more  ENTCS 2007»
13 years 9 months ago
Safe Adaptation of Component Coordination
In the domain of software engineering, the use of software components is now a well established approach. However, it raises problems about the dynamic adaptation of these compone...
Christophe Sibertin-Blanc, Philippe Mauran, G&eacu...
SOCO
2008
Springer
13 years 9 months ago
A face recognition system based on Pseudo 2D HMM applied to neural network coefficients
Face recognition from an image or video sequences is emerging as an active research area with numerous commercial and law enforcement applications. In this paper different Pseudo 2...
Vitoantonio Bevilacqua, Lucia Cariello, Gaetano Ca...
SAC
2002
ACM
13 years 9 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
TVLSI
2008
152views more  TVLSI 2008»
13 years 9 months ago
MMV: A Metamodeling Based Microprocessor Validation Environment
With increasing levels of integration of multiple processing cores and new features to support software functionality, recent generations of microprocessors face difficult validati...
Deepak Mathaikutty, Sreekumar V. Kodakara, Ajit Di...
ICFEM
2010
Springer
13 years 8 months ago
Model-Driven Protocol Design Based on Component Oriented Modeling
Abstract. Due to new emerging areas in the communication field there is a constant need for the design of novel communication protocols. This demands techniques for a rapid and eff...
Prabhu Shankar Kaliappan, Hartmut König, Seba...