Sciweavers

2748 search results - page 380 / 550
» Generating Object-Z Specifications from Use Cases
Sort
View
163
Voted
CSL
2010
Springer
15 years 4 months ago
Monaural speech separation and recognition challenge
Robust speech recognition in everyday conditions requires the solution to a number of challenging problems, not least the ability to handle multiple sound sources. The specific ca...
Martin Cooke, John R. Hershey, Steven J. Rennie
INFSOF
2006
102views more  INFSOF 2006»
15 years 4 months ago
Comparison of software architecture reverse engineering methods
Problems related to interactions between components is a sign of problems with the software architecture of the system and are often costly to fix. Thus it is very desirable to id...
Catherine Stringfellow, C. D. Amory, Dileep Potnur...
128
Voted
DSN
2007
IEEE
15 years 10 months ago
Multiprocessors May Reduce System Dependability under File-Based Race Condition Attacks
Attacks exploiting race conditions have been considered rare and “low risk”. However, the increasing popularity of multiprocessors has changed this situation: instead of waiti...
Jinpeng Wei, Calton Pu
ICDS
2009
IEEE
15 years 11 months ago
An Iterative Method to Design Traffic Flow Models
Existing traffic flow modeling theory lacks of guidelines to construct traffic flow models from scratch. In addition, traffic flow models are mainly analyzed with computer simulat...
Juan Manuel González-Calleros, Jorge Mart&i...
ISSAC
2007
Springer
130views Mathematics» more  ISSAC 2007»
15 years 10 months ago
On probabilistic analysis of randomization in hybrid symbolic-numeric algorithms
Algebraic randomization techniques can be applied to hybrid symbolic-numeric algorithms. Here we consider the problem of interpolating a sparse rational function from noisy values...
Erich Kaltofen, Zhengfeng Yang, Lihong Zhi