Sciweavers

10602 search results - page 2087 / 2121
» Weakly Useful Sequences
Sort
View
FIW
1998
130views Communications» more  FIW 1998»
15 years 5 months ago
A Heuristic Approach to Detect Feature Interactions in Requirements
We present a method to systematically detect feature interactions in requirements, which are expressed as constraints on system event traces. We show its application on the lift sy...
Maritta Heisel, Jeanine Souquières
IVCNZ
1998
15 years 5 months ago
Duality Principles in Image Processing and Analysis
Duality is a well-established concept in quantum physics. It formalises the fact that what one observes is not nature in itself, but--in Heisenberg's words--"nature expo...
Luc Florack
152
Voted
NIPS
2000
15 years 5 months ago
One Microphone Source Separation
Source separation, or computational auditory scene analysis, attempts to extract individual acoustic objects from input which contains a mixture of sounds from different sources, ...
Sam T. Roweis
WSC
1997
15 years 5 months ago
Multiplexed State Saving for Bounded Rollback
Optimistic parallel discrete event simulation (PDES) uses a state history trail to support rollback. State saving strategies range from making a complete copy of a model’s state...
Fabian Gomes, Brian Unger, John G. Cleary, Steve F...
179
Voted
FORTE
1994
15 years 5 months ago
An improvement in formal verification
Critical safety and liveness properties of a concurrent system can often be proven with the help of a reachability analysis of a finite state model. This type of analysis is usual...
Gerard J. Holzmann, Doron Peled
« Prev « First page 2087 / 2121 Last » Next »