Sciweavers

4890 search results - page 819 / 978
» From system specifications to component behavioral models
Sort
View
PPOPP
2009
ACM
14 years 11 months ago
Safe open-nested transactions through ownership
Researchers in transactional memory (TM) have proposed open nesting as a methodology for increasing the concurrency of transactional programs. The idea is to ignore "low-leve...
Kunal Agrawal, I.-Ting Angelina Lee, Jim Sukha
ER
2007
Springer
146views Database» more  ER 2007»
14 years 2 months ago
Achieving, Satisficing, and Excelling
Abstract. Definitions of the concepts derived from the goal concept (including functional and nonfunctional goal, hardgoal, and softgoal) used in requirements engineering are discu...
Ivan Jureta, Stéphane Faulkner, Pierre-Yves...
CCS
2004
ACM
14 years 3 months ago
MAC and UML for secure software design
Security must be a first class citizen in the design of large scale, interacting, software applications, at early and all stages of the lifecycle, for accurate and precise policy ...
Thuong Doan, Steven A. Demurjian, T. C. Ting, Andr...
JMLR
2006
169views more  JMLR 2006»
13 years 10 months ago
Bayesian Network Learning with Parameter Constraints
The task of learning models for many real-world problems requires incorporating domain knowledge into learning algorithms, to enable accurate learning from a realistic volume of t...
Radu Stefan Niculescu, Tom M. Mitchell, R. Bharat ...
CVPR
1998
IEEE
15 years 11 days ago
Subtly Different Facial Expression Recognition and Expression Intensity Estimation
We have developed a computer vision system, including both facial feature extraction and recognition, that automatically discriminates among subtly different facial expressions. E...
James Jenn-Jier Lien, Takeo Kanade, Jeffrey F. Coh...