Sciweavers

3909 search results - page 646 / 782
» Extreme Model Checking
Sort
View
132
Voted
AC
2002
Springer
15 years 2 months ago
Embedded Software
nce of computation has systematically abstracted away the physical world. Embedded software systems, however, engage the physical world. Time, concurrency, liveness, robustness, c...
Edward A. Lee
116
Voted
ACL
2010
15 years 20 days ago
Bitext Dependency Parsing with Bilingual Subtree Constraints
This paper proposes a dependency parsing method that uses bilingual constraints to improve the accuracy of parsing bilingual texts (bitexts). In our method, a targetside tree frag...
Wenliang Chen, Jun'ichi Kazama, Kentaro Torisawa
142
Voted
SECON
2010
IEEE
15 years 15 days ago
Secondis: An Adaptive Dissemination Protocol for Synchronizing Wireless Sensor Networks
Reliability and predictability of the timing behavior have shown to be major issues for wireless sensor network deployments. Real-time requirements presented by several application...
Federico Ferrari, Andreas Meier, Lothar Thiele
167
Voted
WOA
2010
15 years 15 days ago
Using Mobile Agents for Secure Biometric Authentication
This paper deals with the definition of a strong authentication model, coupling usual password/PIN based methods with a biometric matching, over a Multi Agent distributed infrastru...
Marco Tranquillin, Carlo Ferrari, Michele Moro
IEEEARES
2009
IEEE
15 years 11 days ago
Software Inspections Using Guided Checklists to Ensure Security Goals
Security is a crucial issue in many modern software systems and can lead to immense costs if required security goals are not fulfilled. Fewer techniques exist to address the syste...
Frank Elberzhager, Alexander Klaus, Marek Jawurek