Sciweavers

5227 search results - page 904 / 1046
» Enterprise modeling using class and instance models
Sort
View
ICSE
2008
IEEE-ACM
14 years 9 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
CAV
2009
Springer
182views Hardware» more  CAV 2009»
14 years 4 months ago
Generalizing DPLL to Richer Logics
The DPLL approach to the Boolean satisfiability problem (SAT) is a combination of search for a satisfying assignment and logical deduction, in which each process guides the other....
Kenneth L. McMillan, Andreas Kuehlmann, Mooly Sagi...
ICASSP
2009
IEEE
14 years 3 months ago
Genre effects on automatic sentence segmentation of speech: A comparison of broadcast news and broadcast conversations
We investigate genre effects on the task of automatic sentence segmentation, focusing on two important domains – broadcast news (BN) and broadcast conversation (BC). We employ a...
Jáchym Kolár, Yang Liu, Elizabeth Sh...
ISVC
2009
Springer
14 years 3 months ago
Propagation of Pixel Hypotheses for Multiple Objects Tracking
Abstract. In this paper we propose a new approach for tracking multiple objects in image sequences. The proposed approach differs from existing ones in important aspects of the re...
Haris Baltzakis, Antonis A. Argyros
MHCI
2009
Springer
14 years 3 months ago
Examining human values in adopting ubiquitous technology in school
This paper summarizes value analysis of adopting technologysupported attendance control service in a primary school. The results are based on a case study that explored a 14-week ...
Minna Isomursu, Mari Ervasti, Marianne Kinnula, Pe...