Sciweavers

90 search results - page 18 / 18
» Recovering system specific rules from software repositories
Sort
View
POPL
2008
ACM
14 years 5 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
FUIN
2008
119views more  FUIN 2008»
13 years 4 months ago
Modeling Communication with Synchronized Environments
A deterministic behavior of systems composed of several modules is a desirable design goal. Assembling a complex system from components requires also a high degree of re-usability....
Tiberiu Seceleanu, Axel Jantsch
KBSE
2002
IEEE
13 years 9 months ago
Process Support for Tools Interoperability
Commercial tools are heavily used, relatively cheap, well maintained, and provide powerful functionalities. However, composing these tools in order to build larger applications ra...
Anh-Tuyet Le
VLC
2008
129views more  VLC 2008»
13 years 4 months ago
Proposing a speech to gesture translation architecture for Spanish deaf people
This article describes an architecture for translating speech into Spanish Sign Language (SSL). The architecture proposed is made up of four modules: speech recognizer, semantic a...
Rubén San Segundo, Juan Manuel Montero, Jav...
DAS
2010
Springer
13 years 8 months ago
Analysis and taxonomy of column header categories for web tables
We describe a component of a document analysis system for constructing ontologies for domain-specific web tables imported into Excel. This component automates extraction of the Wa...
Sharad C. Seth, Ramana Chakradhar Jandhyala, Mukka...