Sciweavers

SAC
2010
ACM
13 years 8 months ago
Data-aware design and verification of service compositions with Reo and mCRL2
Service-based systems can be modeled as stand-alone services coordinated by external connectors. Reo is a channelbased coordination language with well-defined semantics that enabl...
Natallia Kokash, Christian Krause, Erik P. de Vink
SAC
2010
ACM
13 years 8 months ago
Towards interactionflows for smart products
Nowadays, the interaction between a product and the user is described using different methods than for product to product communication. This makes it difficult to replace users a...
Marcus Ständer
SAC
2010
ACM
13 years 8 months ago
Visual processing-inspired fern-audio features for noise-robust speaker verification
In this paper, we consider the problem of speaker verification as a two-class object detection problem in computer vision, where the object instances are 1-D short-time spectral v...
Anindya Roy, Sébastien Marcel
SAC
2010
ACM
13 years 8 months ago
Chemotaxis-based sorting of self-organizing heterotypic agents
Cell sorting is a fundamental phenomenon in morphogenesis, which is the process that leads to shape formation in living organisms. The sorting of heterotypic cell populations is p...
Manolya Eyiyurekli, Linge Bai, Peter I. Lelkes, Da...
SAC
2010
ACM
13 years 8 months ago
Text line detection and segmentation: uneven skew angles and hill-and-dale writing
A line detection and segmentation technique is presented. The proposed technique is an improved version of an older technique. The experiments have been performed on the dataset o...
Ergina Kavallieratou
SAC
2010
ACM
13 years 8 months ago
Towards modular i* models
Fernanda M. R. Alencar, Jaelson Castro, Már...
SAC
2010
ACM
13 years 8 months ago
Improving the efficiency of dynamic malware analysis
Each day, security companies see themselves confronted with thousands of new malware programs. To cope with these large quantities, researchers and practitioners alike have develo...
Ulrich Bayer, Engin Kirda, Christopher Kruegel
SAC
2010
ACM
13 years 8 months ago
Improving cost and accuracy of DPI traffic classifiers
Traffic classification through Deep Packet Inspection (DPI) is considered extremely expensive in terms of processing costs, leading to the conclusion that this technique is not su...
Niccolo Cascarano, Luigi Ciminiera, Fulvio Risso
SAC
2010
ACM
13 years 8 months ago
Graph-based verification of static program constraints
Software artifacts usually have static program constraints and these constraints should be satisfied in each reuse. In addition to this, the developers are also required to satisf...
Selim Ciraci, Pim van den Broek, Mehmet Aksit
SAC
2010
ACM
13 years 8 months ago
FANGS: high speed sequence mapping for next generation sequencers
Next Generation Sequencing machines are generating millions of short DNA sequences (reads) everyday. There is a need for efficient algorithms to map these sequences to the referen...
Sanchit Misra, Ramanathan Narayanan, Simon Lin, Al...