Sciweavers

3555 search results - page 219 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
FLAIRS
2003
15 years 5 months ago
Utilizing Validation Experience for System Validation
This paper adopts the idea of using knowledge gained by various validation sessions over time with a validation technology developed previously. The work is designed to reduce the...
Rainer Knauf, Avelino J. Gonzalez, Setsuo Tsuruta
ICTAI
2009
IEEE
15 years 11 months ago
Cross-Media Knowledge Extraction in the Car Manufacturing Industry
In this paper, we present a novel framework for machine learning-based cross-media knowledge extraction. The framework is specifically designed to handle documents composed of th...
José Iria, Spiros Nikolopoulos, Martin Mozi...
146
Voted
SMI
2010
IEEE
120views Image Analysis» more  SMI 2010»
15 years 2 months ago
Single-Cycle Plain-Woven Objects
—It has recently been shown that if we twist an arbitrary subset of edges of a mesh on an orientable surface, the resulting extended graph rotation system (EGRS) can be used to i...
Qing Xing, Ergun Akleman, Jianer Chen, Jonathan L....
ASAP
2002
IEEE
76views Hardware» more  ASAP 2002»
15 years 9 months ago
A Component Architecture for FPGA-Based, DSP System Design
† Introducing FPGA components into DSP system implementations creates an assortment of challenges across system architecture and logic design. Recognizing that some of the greate...
Gary Spivey, Shuvra S. Bhattacharyya, Kazuo Nakaji...
DSN
2002
IEEE
15 years 9 months ago
Model Checking Performability Properties
Model checking has been introduced as an automated technique to verify whether functional properties, expressed in a formal logic like computational tree logic (CTL), do hold in a...
Boudewijn R. Haverkort, Lucia Cloth, Holger Herman...