Sciweavers

1916 search results - page 256 / 384
» Reconfiguring a state machine
Sort
View
RULEML
2009
Springer
14 years 3 months ago
Correlating Business Events for Event-Triggered Rules
Abstract. Event processing rules may be prescribed in many different ways, including by finite state machines, graphical methods, ECA (event-conditionaction) rules or reactive rule...
Josef Schiefer, Hannes Obweger, Martin Suntinger
COMSWARE
2008
IEEE
14 years 3 months ago
On implementing security at the transport layer
— We design a framework that implements security at the TCP layer to meet the necessity for a practical and truly end-to-end security solution. We call our framework TCPsec. TCPs...
Swaminathan Pichumani, Sneha Kumar Kasera
CSSE
2008
IEEE
14 years 3 months ago
Designing and Verifying Communication Protocols Using Model Driven Architecture and Spin Model Checker
Abstract: The need of communication protocols in today’s environment increases as much as the network explores. Many new kinds of protocols, e.g. for information sharing, securit...
Prabhu Shankar Kaliappan, Hartmut Koenig, Vishnu K...
ICASSP
2008
IEEE
14 years 3 months ago
Using variational bayes free energy for unsupervised voice activity detection
This paper addresses the problem of Voice Active Detection (VAD) in noisy environments. We introduce Variational Bayes approach to EM for classification to replace the heuristic ...
David Cournapeau, Tatsuya Kawahara
IRI
2008
IEEE
14 years 3 months ago
Modeling and synthesis of service composition using tree automata
— We revisit the problem of synthesis of service composition in the context of service oriented architecture from a tree automata perspective. Comparing to existing finite state...
Ken Q. Pu, Ying Zhu