Sciweavers

6047 search results - page 224 / 1210
» Modeling with Extend
Sort
View
138
Voted
IFIP
2009
Springer
15 years 1 months ago
Model Checking of Security-Sensitive Business Processes
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Alessandro Armando, Serena Elisa Ponta
CHI
2007
ACM
16 years 4 months ago
Modeling steering within above-the-surface interaction layers
Interaction techniques that utilize the space above the display surface to extend the functionalities of digitized surfaces continue to emerge. In such techniques, movements are c...
Raghavendra S. Kattinakere, Tovi Grossman, Sriram ...
122
Voted
ICASSP
2009
IEEE
15 years 10 months ago
Joint map adaptation of feature transformation and Gaussian Mixture Model for speaker recognition
This paper extends our previous work on feature transformationbased support vector machines for speaker recognition by proposing a joint MAP adaptation of feature transformation (...
Donglai Zhu, Bin Ma, Haizhou Li
IROS
2009
IEEE
180views Robotics» more  IROS 2009»
15 years 10 months ago
Control of redundant robots using learned models: An operational space control approach
Abstract— We present an adaptive control approach combining forward kinematics model learning methods with the operational space control approach. This combination endows the rob...
Camille Salaün, Vincent Padois, Olivier Sigau...
ECSQARU
2009
Springer
15 years 10 months ago
Modelling Argument Accrual in Possibilistic Defeasible Logic Programming
Argumentation frameworks have proven to be a successful approach to formalizing commonsense reasoning. Recently, some argumentation frameworks have been extended to deal with possi...
Mauro Javier Gómez Lucero, Carlos Ivá...