Sciweavers

4763 search results - page 2 / 953
» On the Execution of Deep Models
Sort
View
ANCS
2007
ACM
13 years 8 months ago
Ruler: high-speed packet matching and rewriting on NPUs
Programming specialized network processors (NPU) is inherently difficult. Unlike mainstream processors where architectural features such as out-of-order execution and caches hide ...
Tomas Hruby, Kees van Reeuwijk, Herbert Bos
SEW
2003
IEEE
13 years 10 months ago
Applying Run-Time Monitoring to the Deep-Impact Fault Protection Engine
Run-time monitoring is a lightweight verification method whereby the correctness of a programs’ execution is verified at run-time using executable specifications. This paper des...
Doron Drusinsky, Garth Watney
APWEB
2010
Springer
13 years 9 months ago
Optimizing Query Processing for the Hidden Web
Abstract. The term Deep Web (sometimes also called Hidden Web) refers to the data content that is created dynamically as the result of a specific search on the Web. In this respec...
Andrea Calì, Davide Martinenghi
ICAIL
1995
ACM
13 years 8 months ago
Automated Legislative Drafting: Generating Paraphrases of Legislation
In this paper, we describe which roles deep structures of law play in (automatic) drafting legislation. Deep structures contain a formal description of the intended normative effe...
Radboud Winkels, Nienke den Haan
BIS
2008
133views Business» more  BIS 2008»
13 years 6 months ago
Deep Web Navigation by Example
Large portions of the Web are buried behind user-oriented interfaces, which can only be accessed by filling out forms. To make the therein contained information accessible to autom...
Yang Wang 0012, Thomas Hornung