Sciweavers

846 search results - page 128 / 170
» Rewrite-Based Decision Procedures
Sort
View
159
Voted
SIN
2009
ACM
15 years 11 months ago
An information security ontology incorporating human-behavioural implications
Security managers often regard human behaviour as a security liability, but they should accommodate it within their organisation’s information security management procedures. To...
Simon Edward Parkin, Aad P. A. van Moorsel, Robert...
CDC
2008
IEEE
117views Control Systems» more  CDC 2008»
15 years 11 months ago
Event-based optimization for dispatching policies in material handling systems of general assembly lines
—A material handling (MH) system of a general assembly line dispatching parts from inventory to working buffers could be complicated and costly to operate. Generally it is extrem...
Yanjia Zhao, Qianchuan Zhao, Qing-Shan Jia, Xiaoho...
CDC
2008
IEEE
120views Control Systems» more  CDC 2008»
15 years 11 months ago
Approximate abstractions of discrete-time controlled stochastic hybrid systems
ate Abstractions of Discrete-Time Controlled Stochastic Hybrid Systems Alessandro D’Innocenzo, Alessandro Abate, and Maria D. Di Benedetto — This work proposes a procedure to c...
Alessandro D'Innocenzo, Alessandro Abate, Maria Do...
ICASSP
2008
IEEE
15 years 11 months ago
A two-layered trellis approach to audio encoding
The fact that audio compression for streaming or storage is usually performed offline alleviates traditional constraints on encoding delay. We propose a rate-distortion optimized...
Vinay Melkote, Kenneth Rose
ICSM
2008
IEEE
15 years 11 months ago
Change impact analysis for AspectJ programs
Change impact analysis is a useful technique for software evolution. It determines the effects of a source editing session and provides valuable feedbacks to the programmers for m...
Sai Zhang, Zhongxian Gu, Yu Lin, Jianjun Zhao