Sciweavers

1658 search results - page 125 / 332
» Implementing Bit-addressing with Specialization
Sort
View
IAT
2009
IEEE
14 years 3 months ago
Agent-Based Security System for User Verification
—We present a security system consisting of an arbitrary number of entries, sensors and agents. The intelligent integrated system is based on user modeling, i.e. models of their ...
Erik Dovgan, Bostjan Kaluza, Tea Tusar, Matjaz Gam...
MKM
2009
Springer
14 years 3 months ago
Combining Coq and Gappa for Certifying Floating-Point Programs
Abstract. Formal verification of numerical programs is notoriously difficult. On the one hand, there exist automatic tools specialized in floatingpoint arithmetic, such as Gappa...
Sylvie Boldo, Jean-Christophe Filliâtre, Gui...
SEMWEB
2009
Springer
14 years 3 months ago
TaxoMap in the OAEI 2009 Alignment Contest
Abstract. TaxoMap is an alignment tool which aims to discover rich correspondences between concepts. It performs an oriented alignment (from a source to a target ontology) and take...
Fayçal Hamdi, Brigitte Safar, Nobal B. Nira...
MOBILWARE
2009
ACM
14 years 3 months ago
Map-Based Compressive Sensing Model for Wireless Sensor Network Architecture, A Starting Point
Sub-Nyquist sampling techniques for Wireless Sensor Networks (WSN) are gaining increasing attention as an alternative method to capture natural events with desired quality while mi...
Mohammadreza Mahmudimanesh, Abdelmajid Khelil, Nas...
CODES
2008
IEEE
14 years 3 months ago
You can catch more bugs with transaction level honey
In this special session we explore holistic approaches to hardware/software debug that use or integrate transaction level models (TLMs). We present several TLM-based approaches to...
Miron Abramovici, Kees Goossens, Bart Vermeulen, J...