Sciweavers

1993 search results - page 339 / 399
» Designing and Building Parallel Program
Sort
View
B
2007
Springer
15 years 3 months ago
Security Policy Enforcement Through Refinement Process
Abstract. In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue...
Nicolas Stouls, Marie-Laure Potet
AVI
2008
15 years 2 months ago
End-user visualizations
Computer visualization has advanced dramatically over the last few years, partially driven by the exploding video game market. 3D hardware acceleration has reached the point where...
Alexander Repenning, Andri Ioannidou
EMSOFT
2006
Springer
15 years 1 months ago
Reusable models for timing and liveness analysis of middleware for distributed real-time and embedded systems
Distributed real-time and embedded (DRE) systems have stringent constraints on timeliness and other properties whose assurance is crucial to correct system behavior. Formal tools ...
Venkita Subramonian, Christopher D. Gill, Cé...
LREC
2008
135views Education» more  LREC 2008»
15 years 1 months ago
CORP-ORAL: Spontaneous Speech Corpus for European Portuguese
Research activity on the Portuguese language for speech synthesis and recognition has suffered from a considerable lack of human and material resources. This has raised some obsta...
Fabíola Santos, Tiago Freitas
LISA
2004
15 years 1 months ago
Auto-configuration by File Construction: Configuration Management with newfig
A tool is described that provides for the automatic configuration of systems from a single description. The tool, newfig, uses two simple concepts to provide its functionality: bo...
William LeFebvre, David Snyder