Sciweavers

592 search results - page 98 / 119
» Refining Goal Models by Evaluating System Behaviour
Sort
View
IJNSEC
2008
150views more  IJNSEC 2008»
14 years 11 months ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald
ICPR
2008
IEEE
15 years 6 months ago
Motherese detection based on segmental and supra-segmental features
In this paper, we present an automatic motherese detection system for the study of parent-infant interaction analysis. Motherese is a speech register directed towards infants and ...
Ammar Mahdhaoui, Mohamed Chetouani, Cong Zong
IROS
2008
IEEE
104views Robotics» more  IROS 2008»
15 years 6 months ago
Optimal design of a 6-dof parallel measurement mechanism integrated in a 3-dof parallel machine-tool
Abstract— This paper presents the design and the optimization of a parallel machine-tool composed of (i) an 3-dof actuated parallel mechanism (a linear Delta) and (ii) a 6-dof me...
David Corbel, Olivier Company, François Pie...
ICCD
2000
IEEE
69views Hardware» more  ICCD 2000»
15 years 4 months ago
Hierarchical Simulation of a Multiprocessor Architecture
When proposing new architectural enhancements, it is also important to account for the hardware complexity. To achieve this goal, we propose to model the new design in a hardware ...
Marius Pirvu, Laxmi N. Bhuyan, Rabi N. Mahapatra
JSS
2006
107views more  JSS 2006»
14 years 11 months ago
Measuring the usability of software components
The last decade marked the first real attempt to turn software development into engineering through the concepts of ComponentBased Software Development (CBSD) and Commercial Off-T...
Manuel F. Bertoa, José M. Troya, Antonio Va...