Sciweavers

2661 search results - page 354 / 533
» Model Checking Performability Properties
Sort
View
98
Voted
SIGMOD
2011
ACM
170views Database» more  SIGMOD 2011»
14 years 3 months ago
Querying contract databases based on temporal behavior
Considering a broad definition for service contracts (beyond web services and software, e.g. airline tickets and insurance policies), we tackle the challenges of building a high ...
Elio Damaggio, Alin Deutsch, Dayou Zhou
84
Voted
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
14 years 10 months ago
A DAA Scheme Requiring Less TPM Resources
Abstract. Direct anonymous attestation (DAA) is a special digital signature primitive, which provides a balance between signer authentication and privacy. One of the most interesti...
Liqun Chen
144
Voted
TON
2010
167views more  TON 2010»
14 years 7 months ago
A Machine Learning Approach to TCP Throughput Prediction
TCP throughput prediction is an important capability in wide area overlay and multi-homed networks where multiple paths may exist between data sources and receivers. In this paper...
Mariyam Mirza, Joel Sommers, Paul Barford, Xiaojin...
103
Voted
ICANN
2007
Springer
15 years 4 months ago
Text-Independent Speaker Authentication with Spiking Neural Networks
This paper presents a novel system that performs text-independent speaker authentication using new spiking neural network (SNN) architectures. Each speaker is represented by a set ...
Simei Gomes Wysoski, Lubica Benuskova, Nikola Kasa...
110
Voted
MODELS
2007
Springer
15 years 6 months ago
A UML Profile for Developing Airworthiness-Compliant (RTCA DO-178B), Safety-Critical Software
Many safety-related and certification standards exist for developing safety-critical systems. Safety assessments are performed in practice, and system certification according to a...
Gregory Zoughbi, Lionel C. Briand, Yvan Labiche