Abstract. Depending on whether the users or the providers are performing it, Identity Management (IM) traditionally has different meanings. For users, IM means to choose between on...
In this article, we are studying the differences between the European languages using statistical and unsupervised methods. The analysis is conducted in different levels of languag...
Kimmo Kettunen, Markus Sadeniemi, Tiina Lindh-Knuu...
Abstract. The correctness of a system according to a given specification is essential, especially for safety-critical applications. One such typical application domain is the autom...
Jewgenij Botaschanjan, Alexander Gruler, Alexander...
In this paper we research an FPGA based Application Specific Instruction Set Processor (ASIP) tailored to the needs of a flow aware Ethernet access node. The processor has an arch...
K. Van Renterghem, Dieter Verhulst, S. Verschuere,...
A second-generation autonomous music composition tool is developed using Genetic Algorithms. The composition is conducted in two Stages. The first Stage generates and identifies m...