Sciweavers

9974 search results - page 1727 / 1995
» Software Interconnection Models
Sort
View
148
Voted
BCS
2008
15 years 4 months ago
Tools for Traceable Security Verification
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work toward...
Jan Jürjens, Yijun Yu, Andreas Bauer 0002
106
Voted
LREC
2010
163views Education» more  LREC 2010»
15 years 4 months ago
LIPS: A Tool for Predicting the Lexical Isolation Point of a Word
We present LIPS (Lexical Isolation Point Software), a tool for accurate lexical isolation point (IP) prediction in recordings of speech. The IP is the point in time in which a wor...
Andrew Thwaites, Jeroen Geertzen, William D. Marsl...
117
Voted
LREC
2010
156views Education» more  LREC 2010»
15 years 4 months ago
Studying Word Sketches for Russian
Without any doubt corpora are vital tools for linguistic studies and solution for applied tasks. Although corpora opportunities are very useful, there is a need of another kind of...
Maria Khokhlova, Victor Zakharov
126
Voted
PTS
2008
87views Hardware» more  PTS 2008»
15 years 4 months ago
Test Construction for Mathematical Functions
The article deals with problems of testing implementations of mathematical functions working with floating-point numbers. It considers current standards' requirements to such ...
Victor V. Kuliamin
141
Voted
SDM
2008
SIAM
206views Data Mining» more  SDM 2008»
15 years 4 months ago
Latent Variable Mining with Its Applications to Anomalous Behavior Detection
In this paper, we propose a new approach to anomaly detection by looking at the latent variable space to make the first step toward latent anomaly detection. Most conventional app...
Shunsuke Hirose, Kenji Yamanishi
« Prev « First page 1727 / 1995 Last » Next »