Sciweavers

3256 search results - page 459 / 652
» Applications of Formal Methods to System Design and Verifica...
Sort
View
AIMSA
2006
Springer
15 years 9 months ago
Machine Learning for Spoken Dialogue Management: An Experiment with Speech-Based Database Querying
Although speech and language processing techniques achieved a relative maturity during the last decade, designing a spoken dialogue system is still a tailoring task because of the ...
Olivier Pietquin
DRM
2006
Springer
15 years 9 months ago
Towards a secure and interoperable DRM architecture
In this paper we look at the problem of interoperability of digital rights management (DRM) systems in home networks. We introduce an intermediate module called the Domain Interop...
Gelareh Taban, Alvaro A. Cárdenas, Virgil D...
APCCM
2006
15 years 6 months ago
On the suitability of UML 2.0 activity diagrams for business process modelling
UML is posited as the "swiss army knife" for systems modelling and design activities. It embodies a number of modelling formalisms that have broad applicability in captu...
Nick Russell, Wil M. P. van der Aalst, Arthur H. M...
DSD
2006
IEEE
95views Hardware» more  DSD 2006»
15 years 9 months ago
Towards Performance-Oriented Pattern-Based Refinement of Synchronous Models onto NoC Communication
We present a performance-oriented refinement approach that refines a perfectly synchronous communication model onto Network-on-Chip (NoC) communication. We first identify four bas...
Zhonghai Lu, Ingo Sander, Axel Jantsch
ACSAC
2002
IEEE
15 years 10 months ago
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Richard A. Kemmerer