Sciweavers

7393 search results - page 1350 / 1479
» Synthesis-for-testability using transformations
Sort
View
PRDC
2009
IEEE
15 years 4 months ago
Quantifying Criticality of Dependability-Related IT Organization Processes in CobiT
—With ever-growing complexity of computer and communication systems analytical methods do not scale, especially with respect to dependability assessment of information technology...
Tobias Goldschmidt, Andreas Dittrich, Miroslaw Mal...
ASIACRYPT
2009
Springer
15 years 4 months ago
Foundations of Non-malleable Hash and One-Way Functions
Non-malleability is an interesting and useful property which ensures that a cryptographic protocol preserves the independence of the underlying values: given for example an encryp...
Alexandra Boldyreva, David Cash, Marc Fischlin, Bo...
SIGIR
2009
ACM
15 years 4 months ago
Combining LVCSR and vocabulary-independent ranked utterance retrieval for robust speech search
Well tuned Large-Vocabulary Continuous Speech Recognition (LVCSR) has been shown to generally be more effective than vocabulary-independent techniques for ranked retrieval of spo...
J. Scott Olsson, Douglas W. Oard
EDBT
2010
ACM
188views Database» more  EDBT 2010»
15 years 4 months ago
Subsumption and complementation as data fusion operators
The goal of data fusion is to combine several representations of one real world object into a single, consistent representation, e.g., in data integration. A very popular operator...
Jens Bleiholder, Sascha Szott, Melanie Herschel, F...
ECRTS
2008
IEEE
15 years 4 months ago
Temporal Analysis for Adapting Concurrent Applications to Embedded Systems
Embedded services and applications that interact with the real world often, over time, need to run on different kinds of hardware (low-cost microcontrollers to powerful multicore ...
Sibin Mohan, Johannes Helander
« Prev « First page 1350 / 1479 Last » Next »