Sciweavers

9006 search results - page 1486 / 1802
» Modeling Software
Sort
View
UTP
2010
15 years 2 months ago
Unifying Theories of Confidentiality
Abstract. This paper presents a framework for reasoning about the security of confidential data within software systems. A novelty is that we use Hoare and He's Unifying Theor...
Michael J. Banks, Jeremy L. Jacob
ICASSP
2009
IEEE
15 years 2 months ago
VLSI for 5000-word continuous speech recognition
We have developed a VLSI chip for 5,000 word speakerindependent continuous speech recognition. This chip employs a context-dependent HMM (hidden Markov model) based speech recogni...
Young-kyu Choi, Kisun You, Jungwook Choi, Wonyong ...
IFIP12
2009
15 years 2 months ago
Visualizing RDF Documents
The Semantic Web (SW) is an extension to the current Web, enhancing the available information with semantics. RDF, one of the most prominent standards for representing meaning in t...
Aris Athanassiades, Efstratios Kontopoulos, Nick B...
ENTCS
2010
88views more  ENTCS 2010»
15 years 2 months ago
Range and Set Abstraction using SAT
d Set Abstraction using SAT Edd Barrett Andy King School of Computing, University of Kent, CT2 7NF, UK Symbolic decision trees are not the only way to correlate the relationship b...
Edd Barrett, Andy King
ENTCS
2010
136views more  ENTCS 2010»
15 years 2 months ago
A Solver for Modal Fixpoint Logics
We present MLSolver, a tool for solving the satisfiability and validity problems for modal fixpoint logics. The underlying technique is based on characterisations of satisfiabilit...
Oliver Friedmann, Martin Lange
« Prev « First page 1486 / 1802 Last » Next »