Sciweavers

2686 search results - page 278 / 538
» Using a neural network in the software testing process
Sort
View
ISCAS
2005
IEEE
117views Hardware» more  ISCAS 2005»
15 years 9 months ago
A VLSI model of the bat dorsal nucleus of the lateral lemniscus for azimuthal echolocation
— The dorsal nucleus of the lateral lemniscus (DNLL) is a distinct group of auditory cells that play a strategic role in azimuthal echolocation in the bat. Dominated by EI-type c...
Rock Z. Shi, Timothy K. Horiuchi
125
Voted
IWANN
2005
Springer
15 years 9 months ago
Filtering-Free Blind Separation of Correlated Images
Abstract. When using ICA for image separation, a well-known problem is that most often a large correlation exists between the sources. Because of this dependence, there is no more ...
Frédéric Vrins, John Aldo Lee, Miche...
ICASSP
2011
IEEE
14 years 8 months ago
The IBM 2009 GALE Arabic speech transcription system
We describe the Arabic broadcast transcription system elded by IBM in the GALE Phase 4 machine translation evaluation. Key advances over our Phase 3.5 system include improvements ...
Brian Kingsbury, Hagen Soltau, George Saon, Stephe...
NSPW
2006
ACM
15 years 10 months ago
Dark application communities
In considering new security paradigms, it is often worthwhile to anticipate the direction and nature of future attack paradigms. We identify a class of attacks based on the idea o...
Michael E. Locasto, Angelos Stavrou, Angelos D. Ke...
95
Voted
ACSAC
2004
IEEE
15 years 8 months ago
The Trustworthy Computing Security Development Lifecycle
This paper discusses the Trustworthy Computing Security Development Lifecycle (or simply the SDL), a process that Microsoft has adopted for the development of software that needs ...
Steven B. Lipner