Sciweavers

1015 search results - page 126 / 203
» Usability Engineering integrated with Requirements Engineeri...
Sort
View
COMPSAC
2010
IEEE
14 years 6 months ago
Security in Context: Analysis and Refinement of Software Architectures
Security analysis methods can provide correct yet meaningless results if the assumptions underlying the model do not conform to reality. We present an approach to analyze the secur...
Thomas Heyman, Riccardo Scandariato, Wouter Joosen
CCE
2011
14 years 5 months ago
Development and validation of a dynamic model for regeneration of passivating baths using membrane contactors
Selective liquid membranes have been traditionally employed for liquid/liquid and gas/liquid mass transfer in a wide range of applications. In particular, the Emulsion Pertraction...
Eugenio Bringas, Rosa Mediavilla, Ana María...
TASLP
2011
14 years 5 months ago
Advances in Missing Feature Techniques for Robust Large-Vocabulary Continuous Speech Recognition
— Missing feature theory (MFT) has demonstrated great potential for improving the noise robustness in speech recognition. MFT was mostly applied in the log-spectral domain since ...
Maarten Van Segbroeck, Hugo Van Hamme
ICDE
2004
IEEE
105views Database» more  ICDE 2004»
15 years 11 months ago
SPINE: Putting Backbone into String Indexing
The indexing technique commonly used for long strings, such as genomes, is the suffix tree, which is based on a vertical (intra-path) compaction of the underlying trie structure. ...
Naresh Neelapala, Romil Mittal, Jayant R. Haritsa
VLSID
2002
IEEE
119views VLSI» more  VLSID 2002»
15 years 10 months ago
Reducing Library Development Cycle Time through an Optimum Layout Create Flow
One of the major roadblocks in reduction of library generation cycle time is the layout generation phase. The two methods of doing automatic layout generation are synthesis and mig...
Rituparna Mandal, Dibyendu Goswami, Arup Dash