Sciweavers

3555 search results - page 231 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
ENTCS
2008
106views more  ENTCS 2008»
15 years 5 months ago
Verifying Test-Hypotheses: An Experiment in Test and Proof
HOL-TestGen is a specification and test case generation environment extending the interactive theorem prover Isabelle/HOL. The HOL-TestGen method is two-staged: first, the origina...
Achim D. Brucker, Lukas Brügger, Burkhart Wol...
HICSS
2002
IEEE
103views Biometrics» more  HICSS 2002»
15 years 10 months ago
Understanding and Selecting Knowledge Management Systems for a Health Information Provider
In the current market there is a proliferation of knowledge management software solutions. The aim of this paper is to discuss issues concerned in selecting such a system to suppo...
Gabby Fennessy
SELMAS
2005
Springer
15 years 10 months ago
Policy-Driven Configuration and Management of Agent Based Distributed Systems
In this paper, we demonstrate a policy based approach for building and managing large scale agent based systems. We identify different classes of policies for agent based componen...
Anand R. Tripathi, Devdatta Kulkarni, Tanvir Ahmed
131
Voted
ACMICEC
2007
ACM
114views ECommerce» more  ACMICEC 2007»
15 years 9 months ago
A service system design approach for ITV banking
The design of Interactive TV services is in an experimental phase. The design of these services needs a more structured approach that enables the actors involved to cooperate and ...
Els vandekar, Jessica Groeneweg
MLMI
2005
Springer
15 years 10 months ago
Hierarchical Multi-stream Posterior Based Speech Recognition System
Abstract. In this paper, we present initial results towards boosting posterior based speech recognition systems by estimating more informative posteriors using multiple streams of ...
Hamed Ketabdar, Hervé Bourlard, Samy Bengio