Sciweavers

3555 search results - page 186 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
136
Voted
AISC
1994
Springer
15 years 8 months ago
Using Commutativity Properties for Controlling Coercions
This paper investigates some soundness conditions which have to be fulfilled in systems with coercions and generic operators. A result of Reynolds on unrestricted generic operators...
Stephan A. Missura, Andreas Weber
ISCAS
2003
IEEE
172views Hardware» more  ISCAS 2003»
15 years 9 months ago
Efficient symbol synchronization techniques using variable FIR or IIR interpolation filters
Maximum Likelihood estimation theory can be used to develop optimal timing recovery schemes for digital communication systems. Tunable digital interpolation filters are commonly ...
Martin Makundi, Timo I. Laakso
ECAI
2010
Springer
15 years 5 months ago
Acquisition of Grammar in Autonomous Artificial Systems
Over the past several decades, psycholinguists have gained countless insights into the process of child language acquisition. Can these findings be used for the development of lang...
Kateryna Gerasymova, Michael Spranger
FORMATS
2003
Springer
15 years 9 months ago
Performance Analysis of Probabilistic Timed Automata Using Digital Clocks
Probabilistic timed automata, a variant of timed automata extended with discrete probability distributions, is a specification formalism suitable for describing both nondeterminis...
Marta Z. Kwiatkowska, Gethin Norman, David Parker,...
SELMAS
2004
Springer
15 years 9 months ago
Composition of a New Process to Meet Agile Needs Using Method Engineering
The need of developing a new software engineering process (SEP) that could allow the quick prototyping of some robotic applications and meet the requests coming from some companie...
Massimo Cossentino, Valeria Seidita