Sciweavers

2272 search results - page 116 / 455
» Validity Invariants and Effects
Sort
View
CW
2006
IEEE
14 years 4 months ago
A New Method for Developing Business Applications: The Cellular Data System
Currently, in the development of business applications, difficulties occasionally arise between the customer side and the supplier side, causing delays and higher development cost...
Toshio Kodama, Tosiyasu L. Kunii, Yoichi Seki
ASPDAC
2006
ACM
74views Hardware» more  ASPDAC 2006»
14 years 4 months ago
Macromodelling oscillators using Krylov-subspace methods
— We present an efficient method for automatically extracting unified amplitude/phase macromodels of arbitrary oscillators from their SPICE-level circuit descriptions. Such com...
Xiaolue Lai, Jaijeet S. Roychowdhury
CCS
2004
ACM
14 years 3 months ago
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture
In order to solve future Multi Level Security (MLS) problems, we have developed a solution based on the DARPA Polymorphous Computing Architecture (PCA). MLS-PCA uses a novel distr...
Brant Hashii
HAIS
2010
Springer
14 years 2 months ago
Recognition of Manual Actions Using Vector Quantization and Dynamic Time Warping
The recognition of manual actions, i.e., hand movements, hand postures and gestures, plays an important role in human-computer interaction, while belonging to a category of particu...
Marcel Martin, Jonathan Maycock, Florian Paul Schm...
TOOLS
2000
IEEE
14 years 2 months ago
Testing-for-Trust: The Genetic Selection Model Applied to Component Qualification
This paper presents a method and a tool for building trustable OO components. The methodology is based on an integrated design and test approach for OO software components. It is ...
Benoit Baudry, Vu Le Hanh, Yves Le Traon