Sciweavers

1884 search results - page 111 / 377
» Abstraction from Counters: An Application on Real-Time Syste...
Sort
View
JVCA
2002
180views more  JVCA 2002»
14 years 9 months ago
A programming environment for behavioural animation
Behavioural models offer the ability to simulate autonomous agents like organisms and living beings. Psychological studies have showed that the human behaviour can be described by...
Frédéric Devillers, Stéphane ...
ICANN
2007
Springer
15 years 4 months ago
An Application of Recurrent Neural Networks to Discriminative Keyword Spotting
Abstract. Keyword spotting is a detection task consisting in discovering the presence of specific spoken words in unconstrained speech. The majority of keyword spotting systems ar...
Santiago Fernández, Alex Graves, Jürge...
COMPSAC
2006
IEEE
15 years 1 months ago
A Service-Oriented Design Framework for Secure Network Applications
Abstract---Service Oriented Architecture (SOA) is an architectural style to reuse and integrate existing systems for designing new applications. Each application is designed in an ...
Hiroshi Wada, Junichi Suzuki, Katsuya Oba
LISA
2007
15 years 8 days ago
Secure Isolation of Untrusted Legacy Applications
Existing applications often contain security holes that are not patched until after the system has already been compromised. Even when software updates are available, applying the...
Shaya Potter, Jason Nieh, Matt Selsky
ZUM
2005
Springer
136views Formal Methods» more  ZUM 2005»
15 years 3 months ago
Some Guidelines for Formal Development of Web-Based Applications in B-Method
Abstract. Web-based applications are the most common form of distributed systems that have gained a lot of attention in the past ten years. Today many of us are relying on scores o...
Abdolbaghi Rezazadeh, Michael J. Butler