Sciweavers

2467 search results - page 387 / 494
» Finite State Machines
Sort
View
95
Voted
DSN
2004
IEEE
15 years 4 months ago
Efficient Byzantine-Tolerant Erasure-Coded Storage
This paper describes a decentralized consistency protocol for survivable storage that exploits local data versioning within each storage-node. Such versioning enables the protocol...
Garth R. Goodson, Jay J. Wylie, Gregory R. Ganger,...
96
Voted
FDL
2004
IEEE
15 years 4 months ago
The Formal Simulation Semantics of SystemVerilog
We present a rigorous but transparent semantics definition of SystemVerilog that covers processes with blocking and non-blocking statements as well as their interaction with the s...
Martin Zambaldi, Wolfgang Ecker, T. Kruse, W. M&uu...
95
Voted
DAWAK
2006
Springer
15 years 4 months ago
Mining Direct Marketing Data by Ensembles of Weak Learners and Rough Set Methods
This paper describes problem of prediction that is based on direct marketing data coming from Nationwide Products and Services Questionnaire (NPSQ) prepared by Polish division of A...
Jerzy Blaszczynski, Krzysztof Dembczynski, Wojciec...
89
Voted
ECBS
2006
IEEE
153views Hardware» more  ECBS 2006»
15 years 4 months ago
A Unified Approach for Verification and Validation of Systems and Software Engineering Models
We present in this paper a unified paradigm for the verification and validation of software and systems engineering design models expressed in UML 2.0 or SysML. This paradigm reli...
Luay Alawneh, Mourad Debbabi, Yosr Jarraya, Andrei...
FGR
2006
IEEE
147views Biometrics» more  FGR 2006»
15 years 4 months ago
Cascaded Classification of Gender and Facial Expression using Active Appearance Models
This paper presents an approach to recognising the gender and expression of face images by means of Active Appearance Models (AAM). Features extracted by a trained AAM are used to...
Yunus Saatci, Christopher Town