Sciweavers

8180 search results - page 1592 / 1636
» On the Use of Performance Models to Design Self-Managing Com...
Sort
View
IJON
2008
152views more  IJON 2008»
13 years 6 months ago
Topos: Spiking neural networks for temporal pattern recognition in complex real sounds
This article depicts the approach used to build the Topos application, a simulation of two-wheel robots able to discern real complex sounds. Topos is framed in the nouvelle concep...
Pablo González-Nalda, Blanca Cases
RULEML
2010
Springer
13 years 6 months ago
Transformation of SBVR Compliant Business Rules to Executable FCL Rules
 The  main  source  of  changing  requirements  of  the  dynamic  business   environment  is  response  to  changes  in  regulations  and  contracts  towards  ...
Aqueo Kamada, Guido Governatori, Shazia Wasim Sadi...
ICASSP
2010
IEEE
13 years 5 months ago
Towards objectifying information hiding
In this paper, the concept of object-oriented embedding (OOE) is introduced into information hiding in general and particularly to steganography which is the science that involves...
Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc...
SIGMOD
2009
ACM
132views Database» more  SIGMOD 2009»
14 years 7 months ago
Core schema mappings
Research has investigated mappings among data sources under two perspectives. On one side, there are studies of practical tools for schema mapping generation; these focus on algor...
Giansalvatore Mecca, Paolo Papotti, Salvatore Raun...
ACSAC
2006
IEEE
14 years 1 months ago
Foreign Code Detection on the Windows/X86 Platform
As new attacks against Windows-based machines emerge almost on a daily basis, there is an increasing need to “lock down” individual users’ desktop machines in corporate comp...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi...
« Prev « First page 1592 / 1636 Last » Next »