Sciweavers

3544 search results - page 472 / 709
» Information Security in Open Systems
Sort
View
FCCM
1999
IEEE
210views VLSI» more  FCCM 1999»
15 years 4 months ago
Algorithm Analysis and Mapping Environment for Adaptive Computing Systems: Further Results
Abstract We are developing an integrated algorithm analysis and mapping environment particularly tailored for signal processing applications on Adaptive Computing Systems ACS. Our ...
Eric K. Pauer, Paul D. Fiore, John M. Smith
ICASSP
2010
IEEE
14 years 12 months ago
Using cross-decoder phone coocurrences in phonotactic language recognition
Phonotactic language recognizers are based on the ability of phone decoders to produce phone sequences containing acoustic, phonetic and phonological information, which is partial...
Mikel Peñagarikano, Amparo Varona, Luis Jav...
AGI
2011
14 years 3 months ago
Three Hypotheses about the Geometry of Mind
What set of concepts and formalizations might one use to make a practically useful, theoretically rigorous theory of generally intelligent systems? We present a novel perspective m...
Ben Goertzel, Matthew Iklé
CCS
2006
ACM
15 years 3 months ago
Safety analysis of usage control authorization models
The usage control (UCON) model was introduced as a unified approach to capture a number of extensions for traditional access control models. While the policy specification flexibi...
Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Pre...
JNW
2008
171views more  JNW 2008»
14 years 11 months ago
The Necessity of Semantic Technologies in Grid Discovery
Service discovery and its automation are some of the key features that a large scale, open distributed system must provide so that clients and users may take advantage of shared re...
Serena Pastore