Sciweavers

2015 search results - page 105 / 403
» Hidden Software Capabilities
Sort
View
DKE
2007
115views more  DKE 2007»
13 years 9 months ago
An improved methodology on information distillation by mining program source code
This paper presents a methodology for knowledge acquisition from source code. We use data mining to support semiautomated software maintenance and comprehension and provide practi...
Yiannis Kanellopoulos, Christos Makris, Christos T...
ICWS
2010
IEEE
13 years 7 months ago
Evaluating the Survivability of SOA Systems Based on HMM
Survivability is a crucial property for computer systems that support critical infrastructures of our society. A variety of survivability definitions and evaluation methods for t...
Leilei Chen, Qing Wang, Wei Xu, Liang Zhang
ICASSP
2009
IEEE
13 years 7 months ago
VLSI for 5000-word continuous speech recognition
We have developed a VLSI chip for 5,000 word speakerindependent continuous speech recognition. This chip employs a context-dependent HMM (hidden Markov model) based speech recogni...
Young-kyu Choi, Kisun You, Jungwook Choi, Wonyong ...
IAT
2007
IEEE
14 years 3 months ago
BOA: A Cognitive Tactical Picture Compilation Agent
Simulation-based training in complex decision-making can be made more effective by using intelligent software agents to play key roles, such as teammates, opponents and instructor...
Annerieke Heuvelink, Fiemke Both
SAC
2006
ACM
14 years 3 months ago
Domotic house gateway
This paper presents a domotic house gateway capable of seamlessly interacting with different devices from heterogeneous domotic systems and appliances. Such a gateway also provide...
Paolo Pellegrino, Dario Bonino, Fulvio Corno