Sciweavers

3885 search results - page 249 / 777
» Clarifying Goal Models
Sort
View
SEFM
2006
IEEE
15 years 11 months ago
Describing and Executing Random Reactive Systems
We present an operational model for describing random reactive systems. Some models have already been proposed for this purpose, but they generally aim at performing global reason...
Pascal Raymond, Erwan Jahier, Yvan Roux
AIM
2002
15 years 5 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
ICIP
2003
IEEE
16 years 7 months ago
Deformable face mapping for person identification
This paper introduces a novel deformable model for face mapping and its application to automatic person identification. While most face recognition techniques directly model the f...
Florent Perronnin, Jean-Luc Dugelay, Kenneth Rose
IAT
2007
IEEE
15 years 11 months ago
Network Intrusion Detection by Means of Community of Trusting Agents
We apply advanced agent trust modeling techniques to identify malicious traffic in computer networks. Our work integrates four state-of-the-art techniques from anomaly detection,...
Martin Rehák, Michal Pechoucek, Karel Barto...
NOLISP
2005
Springer
15 years 11 months ago
Pseudo Cepstral Analysis of Czech Vowels
Real generalized cepstral analysis is introduced and applied to speech deconvolution. Real pseudo cepstrum of the vocal tract model impulse response is defined and applied to the a...
Robert Vích