Sciweavers

813 search results - page 27 / 163
» Pipeline-centric provenance model
Sort
View
ECBS
2007
IEEE
155views Hardware» more  ECBS 2007»
14 years 2 months ago
Integrating Security Modeling into Embedded System Design
There is an ever increasing concern about security threats as embedded systems are moving towards networked applications. Model based approaches have proven to be effective techni...
Matthew Eby, Jan Werner, Gabor Karsai, Ákos...
ICSE
2010
IEEE-ACM
14 years 14 days ago
Using dynamic execution traces and program invariants to enhance behavioral model inference
Software behavioral models have proven useful for design, validation, verification, and maintenance. However, existing approaches for deriving such models sometimes overgeneraliz...
Ivo Krka, Yuriy Brun, Daniel Popescu, Joshua Garci...
ACSAC
1999
IEEE
14 years 14 hour ago
Using Abuse Case Models for Security Requirements Analysis
The relationships between the work products of a security engineering process can be hard to understand, even for persons with a strong technical background but little knowledge o...
John P. McDermott, Chris Fox
PAAMS
2010
Springer
13 years 5 months ago
Assessing Knowledge Management in the Power Sector through a Connectionist Model
It has been proven that Artificial Intelligence, in general, and Artificial Neural Networks, in particular, can be successfully applied to problems in the field of Knowledge Manage...
Álvaro Herrero, Lourdes Cecilia Sáiz...
ICMCS
2009
IEEE
115views Multimedia» more  ICMCS 2009»
13 years 5 months ago
Prosody modeling for mandarin exclamatory speech
To improve the expressiveness of speech synthesis, the paper proposes a model to simulate the prosody features of exclamatory speech with modal tags. While compared with reading s...
Huibin Jia, Jianhua Tao