Sciweavers

2661 search results - page 354 / 533
» Model Checking Performability Properties
Sort
View
SIGMOD
2011
ACM
170views Database» more  SIGMOD 2011»
13 years 1 months ago
Querying contract databases based on temporal behavior
Considering a broad definition for service contracts (beyond web services and software, e.g. airline tickets and insurance policies), we tackle the challenges of building a high ...
Elio Damaggio, Alin Deutsch, Dayou Zhou
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
13 years 8 months ago
A DAA Scheme Requiring Less TPM Resources
Abstract. Direct anonymous attestation (DAA) is a special digital signature primitive, which provides a balance between signer authentication and privacy. One of the most interesti...
Liqun Chen
TON
2010
167views more  TON 2010»
13 years 5 months ago
A Machine Learning Approach to TCP Throughput Prediction
TCP throughput prediction is an important capability in wide area overlay and multi-homed networks where multiple paths may exist between data sources and receivers. In this paper...
Mariyam Mirza, Joel Sommers, Paul Barford, Xiaojin...
ICANN
2007
Springer
14 years 2 months ago
Text-Independent Speaker Authentication with Spiking Neural Networks
This paper presents a novel system that performs text-independent speaker authentication using new spiking neural network (SNN) architectures. Each speaker is represented by a set ...
Simei Gomes Wysoski, Lubica Benuskova, Nikola Kasa...
MODELS
2007
Springer
14 years 4 months ago
A UML Profile for Developing Airworthiness-Compliant (RTCA DO-178B), Safety-Critical Software
Many safety-related and certification standards exist for developing safety-critical systems. Safety assessments are performed in practice, and system certification according to a...
Gregory Zoughbi, Lionel C. Briand, Yvan Labiche