Sciweavers

3155 search results - page 229 / 631
» How Are You Doing
Sort
View
MOBISEC
2009
Springer
14 years 4 months ago
Context-Aware Monitoring of Untrusted Mobile Applications
Abstract. Current measures to enhance the security of untrusted mobile applications require a user to trust the software vendor. They do not guarantee complete protection against t...
Andrew Brown, Mark Ryan
TSD
2009
Springer
14 years 4 months ago
On a Computational Model for Language Acquisition: Modeling Cross-Speaker Generalisation
Abstract. The discovery of words by young infants involves two interrelated processes: (a) the detection of recurrent word-like acoustic patterns in the speech signal, and (b) cros...
Louis ten Bosch, Joris Driesen, Hugo Van Hamme, Lo...
ACSC
2008
IEEE
14 years 4 months ago
Relative simulation and model checking of real-time processes
Simulation and model checking are commonly used to compare the behaviour of a computer-based system with its requirements specification. However, when upgrading an operational le...
Colin J. Fidge
AGILEDC
2008
IEEE
14 years 4 months ago
The Good and Bad of Agile Offshore Development
Companies today are attempting to lower costs and increase their staffing flexibility by taking some [or even all] of their development activities overseas. Simultaneously, many o...
Mike Cottmeyer
ICPR
2008
IEEE
14 years 4 months ago
A fast revised simplex method for SVM training
Active set methods for training the Support Vector Machines (SVM) are advantageous since they enable incremental training and, as we show in this research, do not exhibit exponent...
Christopher Sentelle, Georgios C. Anagnostopoulos,...