Sciweavers

1039 search results - page 79 / 208
» The Def-inite Approach to Dependency Analysis
Sort
View
116
Voted
ICSOC
2010
Springer
14 years 11 months ago
Automatic Fragment Identification in Workflows Based on Sharing Analysis
In Service-Oriented Computing (SOC), fragmentation and merging of workflows are motivated by a number of concerns, among which we can cite design issues, performance, and privacy. ...
Dragan Ivanovic, Manuel Carro, Manuel V. Hermenegi...
WWW
2004
ACM
16 years 2 months ago
An xpath-based discourse analysis module for spoken dialogue systems
This paper describes an XPath-based discourse analysis module for Spoken Dialogue Systems that allows the dialogue author to easily manipulate and query both the user input's...
Giuseppe Di Fabbrizio, Charles Lewis
133
Voted
KBSE
2009
IEEE
15 years 8 months ago
Symbolic Deadlock Analysis in Concurrent Libraries and Their Clients
Methods in object-oriented concurrent libraries hide internal synchronization details. However, information hiding may result in clients causing thread safety violations by invoki...
Jyotirmoy V. Deshmukh, E. Allen Emerson, Sriram Sa...
ICPR
2008
IEEE
15 years 8 months ago
Boosting Gaussian mixture models via discriminant analysis
The Gaussian mixture model (GMM) can approximate arbitrary probability distributions, which makes it a powerful tool for feature representation and classification. However, it su...
Hao Tang, Thomas S. Huang
NDSS
2008
IEEE
15 years 8 months ago
Impeding Malware Analysis Using Conditional Code Obfuscation
Malware programs that incorporate trigger-based behavior initiate malicious activities based on conditions satisfied only by specific inputs. State-of-the-art malware analyzers ...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...