The article presents an approach to model based testing of complex systems based on a generalization of finite state machines (FSM) and input output state machines (IOSM). The app...
Victor V. Kuliamin, Alexandre Petrenko, Nick V. Pa...
Abstract. Attack graphs depict ways in which an adversary exploits system vulnerabilities to achieve a desired state. System administrators use attack graphs to determine how vulne...
In this paper, we deal with the problem of determining the best possible physical implementation of an ETL workflow, given its logical-level description and an appropriate cost mo...
We present a discriminative structureprediction model for the letter-to-phoneme task, a crucial step in text-to-speech processing. Our method encompasses three tasks that have bee...
Sittichai Jiampojamarn, Colin Cherry, Grzegorz Kon...
Like many natural phenomenon, clouds are often modeled using procedural methods, which may be difficult for an artist to control. In this paper, a freehand sketching system is prop...
Marc Stiver, Andrew Baker, Adam Runions, Faramarz ...