Sciweavers

1664 search results - page 174 / 333
» Making a Case for Multi-Agent Systems
Sort
View
121
Voted
CEC
2010
IEEE
15 years 6 months ago
AGE-P: Moving from concept to technical realization
Even though evolutionary algorithms have been applied to a vast number of problems, they are still not always applicable. As an example, this paper briefly discusses smart applianc...
Stefan Goldmann, Ralf Salomon
165
Voted
ICIP
2007
IEEE
15 years 5 months ago
Interlacing Intraframes in Multiple-Description Video Coding
We introduce a method to improve performance of multiple-description coding based on legacy video coders with pre- and postprocessing. The pre- and post-processing setup is genera...
Ermin Kozica, Dave Zachariah, W. Bastiaan Kleijn
CAI
2006
Springer
15 years 5 months ago
Formal Verification of Security Model Using SPR Tool
In this paper, formal verification methodologies and the SPR (Safety Problem Resolver) model checking tool are used for verifying a security model's safety. The SPR tool makes...
Il-Gon Kim, Miyoung Kang, Jin-Young Choi, Peter D....
ENGL
2006
111views more  ENGL 2006»
15 years 5 months ago
Voice Recognition with Neural Networks, Type-2 Fuzzy Logic and Genetic Algorithms
We describe in this paper the use of neural networks, fuzzy logic and genetic algorithms for voice recognition. In particular, we consider the case of speaker recognition by analyz...
Patricia Melin, Jérica Urías, Daniel...
154
Voted
IJISEC
2006
88views more  IJISEC 2006»
15 years 5 months ago
Requirements engineering for trust management: model, methodology, and reasoning
Abstract A number of recent proposals aim to incorporate security engineering into mainstream software engineering. Yet, capturing trust and security requirements at an organizatio...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...