Sciweavers

2210 search results - page 323 / 442
» Applying a Model-based Approach for Embedded System Developm...
Sort
View
OOPSLA
2007
Springer
15 years 8 months ago
The design and implementation of formal monitoring techniques
In runtime monitoring, a programmer specifies a piece of code to execute when a trace of events occurs during program execution. Previous and related work has shown that runtime m...
Eric Bodden
ISCAS
2006
IEEE
116views Hardware» more  ISCAS 2006»
15 years 8 months ago
Signal processing for brain-computer interface: enhance feature extraction and classification
Abstract-In this paper we present a new scheme for brain imaginary movement invovles sophisticated spatial-temporalsignal processing and classification for electroencephalogram spe...
Haihong Zhang, Cuntai Guan, Yuanqing Li
EDCC
2008
Springer
15 years 4 months ago
A Transient-Resilient System-on-a-Chip Architecture with Support for On-Chip and Off-Chip TMR
The ongoing technological advances in the semiconductor industry make Multi-Processor System-on-a-Chips (MPSoCs) more attractive, because uniprocessor solutions do not scale satis...
Roman Obermaisser, Hubert Kraut, Christian El Sall...
220
Voted
ADS
2004
Springer
15 years 8 months ago
A Categorical Annotation Scheme for Emotion in the Linguistic Content of Dialogue
Abstract. If we wish to implement dialogue systems which express emotion, dialogue corpora annotated for emotion would be a valuable resource. In order to develop such corpora we r...
Richard Craggs, Mary McGee Wood
128
Voted
ACSAC
2008
IEEE
15 years 9 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...