Sciweavers

1625 search results - page 231 / 325
» Intentionality
Sort
View
ICECCS
2007
IEEE
120views Hardware» more  ICECCS 2007»
15 years 8 months ago
Verifying the CICS File Control API with Z/Eves: An Experiment in the Verified Software Repository
Parts of the CICS transaction processing system were modelled formally in the 1980s in a collaborative project between IBM Hursley Park and Oxford University Computing Laboratory....
Leo Freitas, Konstantinos Mokos, Jim Woodcock
ICASSP
2009
IEEE
15 years 8 months ago
Spoken dialog strategy based on understanding graph search
We regarded information retrieval as a graph search problem and proposed several novel dialog strategies that can recover from misrecognition through a spoken dialog that traverse...
Yuji Kinoshita, Chiyomi Miyajima, Norihide Kitaoka...
ACSAC
2004
IEEE
15 years 8 months ago
Attack Plan Recognition and Prediction Using Causal Networks
Correlating and analyzing security alerts is a critical and challenging task in security management. Recently, some techniques have been proposed for security alert correlation. H...
Xinzhou Qin, Wenke Lee
APSEC
2004
IEEE
15 years 8 months ago
An Integrated Model of ISO 9001: 2000 and CMMI for ISO Registered Organizations
ISO 9001 is a standard for quality management systems while CMMI is a model for process improvement. If an organization that has achieved ISO registration wishes to improve proces...
Chanwoo Yoo, Junho Yoon, Byungjeong Lee, Chong-Won...
APNOMS
2006
Springer
15 years 8 months ago
A Profile Based Vertical Handoff Scheme for Ubiquitous Computing Environment
Specifically ubiquitous computing paradigm is based on seamless connectivity. And also to guarantee the seamless connectivity, an intelligent network management between heterogeneo...
Chung-Pyo Hong, Tae-Hoon Kang, Shin-Dug Kim