Sciweavers

4498 search results - page 149 / 900
» How to Invent Functions
Sort
View
100
Voted
AOSD
2004
ACM
15 years 8 months ago
Deriving security requirements from crosscutting threat descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General s...
Charles B. Haley, Robin C. Laney, Bashar Nuseibeh
CHARME
2001
Springer
98views Hardware» more  CHARME 2001»
15 years 7 months ago
Hardware Synthesis Using SAFL and Application to Processor Design
Abstract. We survey the work done so far in the FLaSH project (Functional Languages for Synthesising Hardware) in which the core ideas are (i) using a functional language SAFL to d...
Alan Mycroft, Richard Sharp
LREC
2010
203views Education» more  LREC 2010»
15 years 4 months ago
Arabic Parsing Using Grammar Transforms
We investigate Arabic Context Free Grammar parsing with dependency annotation comparing lexicalised and unlexicalised parsers. We study how morphosyntactic as well as function tag...
Lamia Tounsi, Josef van Genabith
148
Voted
ADCM
2007
134views more  ADCM 2007»
15 years 2 months ago
Barycentric coordinates for convex sets
In this paper we provide an extension of barycentric coordinates from simplices to arbitrary convex sets. Barycentric coordinates over convex 2D polygons have found numerous appli...
Joe D. Warren, Scott Schaefer, Anil N. Hirani, Mat...
AUTOMATICA
2005
86views more  AUTOMATICA 2005»
15 years 2 months ago
Sensitivity shaping with degree constraint by nonlinear least-squares optimization
This paper presents a new approach to shaping of the frequency response of the sensitivity function. In this approach, a desired frequency response is assumed to be specified at a...
Ryozo Nagamune, Anders Blomqvist