Search
Now showing items 211-220 of 319
Design and implementation of a data stream management system with advanced complex event processing capabilities
(2013-06)
The world has seen proliferation of data stream applications over the last years. These applications include computer network monitoring, Radio Frequency Identication (RFID)-based supply chain and traffic management systems, ...
Preface
(Springer International Publishing, 2016)
The pervasiveness of open systems raises a range of challenges and opportunities for research and technological development in the area of autonomous agents and multi-agent systems. Open systems comprise loosely coupled ...
Composing domain-specific physical models with general-purpose software modules in embedded control software
(Springer Science+Business Media, 2014-02)
A considerable portion of software systems today are adopted in the embedded control domain. Embedded control software deals with controlling a physical system, and as such models of physical characteristics become part ...
Optimizing decomposition of software architecture for local recovery
(Springer Science+Business Media, 2013-06)
The increasing size and complexity of software systems has led to an amplified number of potential failures and as such makes it harder to ensure software reliability. Since it is usually hard to prevent all the failures, ...
Medical podcasting in Iran; pilot, implementation and attitude evaluation
(Tehran University of Medical Sciences, 2013)
Podcasting has become a popular means of transferring knowledge in higher education through making lecture contents available to students at their convenience. Accessing courses on media players provides students with ...
Postprocessing synthetic speech with a complex cepstrum vocoder for spoofing phase-based synthetic speech detectors
(IEEE, 2017-06)
State-of-the-art speaker verification systems are vulnerable to spoofing attacks. To address the issue, high-performance synthetic speech detectors (SSDs) for existing spoofing methods have been proposed. Phase-based SSDs ...
Availability analysis of software architecture decomposition alternatives for local recovery
(2017)
We present an efficient and easy-to-use methodology to predict—at design time—the availability of systems that support local recovery. Our analysis techniques work at the architectural level, where the software designer ...
How to trust a few among many
(Springer International Publishing, 2017)
The presence of numerous and disparate information sources available to support decision-making calls for efficient methods of harnessing their potential. Information sources may be unreliable, and misleading reports can ...
Privacy enforcement through policy extension
(IEEE, 2016)
Successful coalition operations require contributions from the coalition partners which might have hidden goals and desiderata in addition to the shared coalition goals. Therefore, there is an inevitable risk-utility ...
Statik ve dinamik analizler ile hesaplanan risklere dayalı olarak test modellerinin iyileştirilmesi
(CEUR, 2015)
Model bazlı test teknikleri, sistem kullanım modelinden test senaryolarının otomatik olarak oluşturulmasını sağlayarak verimliliği artırmaktadır. Prensip olarak sonsuz sayıda test senaryosu oluşturmak mümkündür; ancak bu ...
Share this page