Sciweavers

1989 search results - page 328 / 398
» Integrity Management in Component Based Systems
Sort
View
ECBS
2006
IEEE
112views Hardware» more  ECBS 2006»
15 years 10 months ago
A Goal-Oriented Approach for Safety Requirements Specification
Robotic systems are developed to execute tasks with several types of risks associated. The possible damages that can affect both the working environment and the self-system lead u...
Elena Navarro, Pedro Sánchez, Patricio Lete...
TASLP
2008
115views more  TASLP 2008»
15 years 4 months ago
Recognition of Dialogue Acts in Multiparty Meetings Using a Switching DBN
Abstract--This paper is concerned with the automatic recognition of dialogue acts (DAs) in multiparty conversational speech. We present a joint generative model for DA recognition ...
Alfred Dielmann, Steve Renals
WWW
2003
ACM
16 years 5 months ago
SHOCK: communicating with computational messages and automatic private profiles
A computationally enhanced message contains some embedded programmatic components that are interpreted and executed automatically upon receipt. Unlike ordinary text email or insta...
Rajan M. Lukose, Eytan Adar, Joshua R. Tyler, Caes...
SIGCOMM
2009
ACM
15 years 11 months ago
Impact of IT monoculture on behavioral end host intrusion detection
In this paper, we study the impact of today’s IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to th...
Dhiman Barman, Jaideep Chandrashekar, Nina Taft, M...
ASE
2005
124views more  ASE 2005»
15 years 4 months ago
Reuse-Conducive Development Environments
Despite its well-recognized benefits, software reuse has not met its expected success due to technical, cognitive, and social difficulties. We have systematically analyzed the reu...
Yunwen Ye, Gerhard Fischer