Sciweavers

897 search results - page 94 / 180
» Reuse, Validation and Verification of System Development Pro...
Sort
View
LREC
2008
121views Education» more  LREC 2008»
13 years 9 months ago
Holy Moses! Leveraging Existing Tools and Resources for Entity Translation
Recently, there has been an emphasis on creating shared resources for natural language processing applications. This has resulted in the development of high-quality tools and data...
Jean Tavernier, Rosa Cowan, Michelle Vanni
BIS
2009
112views Business» more  BIS 2009»
13 years 5 months ago
Ontological Mapping of Information Security Best-Practice Guidelines
Abstract. Due to a rapid growth in the use of electronic data processing and networking, an information security management system with a holistic and widespread view becomes more ...
Stefan Fenz, Thomas Pruckner, Arman Manutscheri
POPL
2010
ACM
14 years 5 months ago
Dependent Types from Counterexamples
d by recent research in abstract model checking, we present a new approach to inferring dependent types. Unlike many of the existing approaches, our approach does not rely on prog...
Tachio Terauchi
WCE
2007
13 years 9 months ago
Fuzzy Estimator Design for the Control Systems with Unknown Time-Delay
—In this paper, a fuzzy estimator based on the Smith predictor for a time-delayed system is proposed. The purpose of this work is to predict the unknown plant time-delay by using...
Y. J. Huang, T. C. Kuo, H. Y. Tseng
NSPW
2004
ACM
14 years 1 months ago
Towards agile security assurance
Agile development methodologies are gaining acceptance in the software industry. If they are to be used for constructing securitycritical solutions, what do we do about assurance?...
Konstantin Beznosov, Philippe Kruchten