Sciweavers

2527 search results - page 377 / 506
» A UML-Based Approach to System Testing
Sort
View
119
Voted
CSMR
2009
IEEE
15 years 10 months ago
Static Security Analysis Based on Input-Related Software Faults
It is important to focus on security aspects during the development cycle to deliver reliable software. However, locating security faults in complex systems is difficult and ther...
Csaba Nagy, Spiros Mancoridis
182
Voted
EMS
2009
IEEE
15 years 10 months ago
Simulation of a Smart Grid City with Software Agents
—In the future smart city, new information and communication technologies will enable a better management of the available resources. The future smart grid infrastructure is emer...
Stamatis Karnouskos, Thiago Nass de Holanda
ICASSP
2009
IEEE
15 years 10 months ago
Robust discriminative keyword spotting for emotionally colored spontaneous speech using bidirectional LSTM networks
In this paper we propose a new technique for robust keyword spotting that uses bidirectional Long Short-Term Memory (BLSTM) recurrent neural nets to incorporate contextual informa...
Martin Wöllmer, Florian Eyben, Joseph Keshet,...
ACCV
2009
Springer
15 years 10 months ago
3D Reconstruction of Human Motion and Skeleton from Uncalibrated Monocular Video
Abstract. This paper introduces a new model-based approach for simultaneously reconstructing 3D human motion and full-body skeletal size from a small set of 2D image features track...
Yen-Lin Chen, Jinxiang Chai
125
Voted
BPM
2009
Springer
258views Business» more  BPM 2009»
15 years 10 months ago
Activity Mining by Global Trace Segmentation
Process Mining is a technology for extracting non-trivial and useful information from execution logs. For example, there are many process mining techniques to automatically discove...
Christian W. Günther, Anne Rozinat, Wil M. P....