Sciweavers

22698 search results - page 4170 / 4540
» Modeling in Software Engineering
Sort
View
BCS
2008
15 years 6 months ago
Tools for Traceable Security Verification
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work toward...
Jan Jürjens, Yijun Yu, Andreas Bauer 0002
LREC
2010
163views Education» more  LREC 2010»
15 years 6 months ago
LIPS: A Tool for Predicting the Lexical Isolation Point of a Word
We present LIPS (Lexical Isolation Point Software), a tool for accurate lexical isolation point (IP) prediction in recordings of speech. The IP is the point in time in which a wor...
Andrew Thwaites, Jeroen Geertzen, William D. Marsl...
PTS
2008
87views Hardware» more  PTS 2008»
15 years 6 months ago
Test Construction for Mathematical Functions
The article deals with problems of testing implementations of mathematical functions working with floating-point numbers. It considers current standards' requirements to such ...
Victor V. Kuliamin
SDM
2008
SIAM
206views Data Mining» more  SDM 2008»
15 years 6 months ago
Latent Variable Mining with Its Applications to Anomalous Behavior Detection
In this paper, we propose a new approach to anomaly detection by looking at the latent variable space to make the first step toward latent anomaly detection. Most conventional app...
Shunsuke Hirose, Kenji Yamanishi
149
Voted
UAI
2008
15 years 6 months ago
Toward Experiential Utility Elicitation for Interface Customization
User preferences for automated assistance often vary widely, depending on the situation, and quality or presentation of help. Developing effective models to learn individual prefe...
Bowen Hui, Craig Boutilier
« Prev « First page 4170 / 4540 Last » Next »