Sciweavers

1878 search results - page 229 / 376
» Efficient Performance Models in Component-Based Software Eng...
Sort
View
CCS
2006
ACM
15 years 1 months ago
Modelling the relative strength of security protocols
In this paper, we present a way to think about the relative strength of security protocols using SoS, a lattice-theoretic representation of security strength. In particular, we di...
Ho Chung, Clifford Neuman
ER
2006
Springer
116views Database» more  ER 2006»
15 years 1 months ago
Quality-Driven Automatic Transformation of Object-Oriented Navigational Models
Abstract. Navigability is a main concern in the design of Web applications. In order to assess such navigability a number of measures has been proposed. From them, measures defined...
Cristina Cachero, Marcela Genero, Coral Calero, Sa...
EUROMICRO
2000
IEEE
15 years 2 months ago
Continuous Discrete-Event Simulation of a Continuous-Media Server I/O Subsystem
When designing computer systems, simulation tools are used to imitate a real or proposed system. Complex, dynamic systems can be simulated without the cost and time constraints in...
Michael Weeks, Chris Bailey, Reza Sotudeh
TASLP
2010
122views more  TASLP 2010»
14 years 4 months ago
Error Approximation and Minimum Phone Error Acoustic Model Estimation
Minimum phone error (MPE) acoustic parameter estimation involves calculation of edit distances (errors) between correct and incorrect hypotheses. In the context of large vocabulary...
Matt Gibson 0002, Thomas Hain
ARCS
2004
Springer
15 years 3 months ago
Latent Semantic Indexing in Peer-to-Peer Networks
Searching in decentralized peer-to-peer networks is a challenging problem. In common applications such as Gnutella, searching is performed by randomly forwarding queries to all pee...
Xuezheng Liu, Ming Chen, Guangwen Yang