Sciweavers

577 search results - page 55 / 116
» An Active Hypertext Model for System Requirements
Sort
View
DEON
2008
Springer
15 years 1 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
JCNS
2010
126views more  JCNS 2010»
14 years 10 months ago
Calibration of the head direction network: a role for symmetric angular head velocity cells
Abstract Continuous attractor networks require calibration. Computational models of the head direction (HD) system of the rat usually assume that the connections that maintain HD n...
Peter Stratton, Gordon Wyeth, Janet Wiles
CHI
2006
ACM
16 years 6 days ago
The design of an interactive and dynamic representation of the firm
Interpretation and audit of financial information is a significant undertaking that must rest on a fuller understanding of the firm and its operations. A pictorial representation ...
Lin Zhao, Julia Grant, Fred L. Collopy
ICHIT
2009
Springer
15 years 6 months ago
Middleware-based distributed systems software process
Middleware facilitates the development of distributed systems by accommodating heterogeneity, hiding distribution details and providing a set of common and domain specific service...
Liu Jingyong, Zhong Yong, Chen Yong, Zhang Lichen
ICASSP
2011
IEEE
14 years 3 months ago
Non-negative matrix deconvolution in noise robust speech recognition
High noise robustness has been achieved in speech recognition by using sparse exemplar-based methods with spectrogram windows spanning up to 300 ms. A downside is that a large exe...
Antti Hurmalainen, Jort F. Gemmeke, Tuomas Virtane...