Sciweavers

2880 search results - page 77 / 576
» Types are calling conventions
Sort
View
CN
2004
108views more  CN 2004»
14 years 11 months ago
Smart dust, friend or foe?--Replacing identity with configuration trust
Smart dust motes are miniature self-contained systems that may be deployed in very large numbers. In military applications these devices are subject to different threats than conv...
Howard Chivers, John A. Clark
AC
1999
Springer
14 years 11 months ago
Architectures and patterns for developing high performance real-time ORB endsystems
Many types of applications can benefit from flexible and open middleware. CORBA is an emerging middleware standard for Object Request Brokers (ORBs) that simplifies the developmen...
Douglas C. Schmidt, David L. Levine, Chris Clevela...
INTERSPEECH
2010
14 years 6 months ago
Learning from human errors: prediction of phoneme confusions based on modified ASR training
In an attempt to improve models of human perception, the recognition of phonemes in nonsense utterances was predicted with automatic speech recognition (ASR) in order to analyze i...
Bernd T. Meyer, Birger Kollmeier
JSC
2010
100views more  JSC 2010»
14 years 6 months ago
An invariant-based approach to the verification of asynchronous parameterized networks
A uniform verification problem for parameterized systems is to determine whether a temporal property is satisfied for every instance of the system which is composed of an arbitrar...
Igor V. Konnov, Vladimir A. Zakharov
MOC
2000
113views more  MOC 2000»
14 years 11 months ago
A finite element approximation for a class of degenerate elliptic equations
In this paper we exhibit a finite element method fitting a suitable geometry naturally associated with a class of degenerate elliptic equations (usually called Grushin type equatio...
Bruno Franchi, Maria Carla Tesi