Sciweavers

1779 search results - page 335 / 356
» A Formal Model of Data Privacy
Sort
View
ACL
2009
14 years 9 months ago
Revisiting Pivot Language Approach for Machine Translation
This paper revisits the pivot language approach for machine translation. First, we investigate three different methods for pivot translation. Then we employ a hybrid method combin...
Hua Wu, Haifeng Wang
IEAAIE
2009
Springer
14 years 9 months ago
Constructing Decisional DNA on Renewable Energy: A Case Study
Knowledge engineering techniques are becoming useful and popular components of hybrid integrated systems used to solve complicated practical problems in different fields. Knowledge...
Cesar Sanín, Edward Szczerbicki
IJACTAICIT
2010
122views more  IJACTAICIT 2010»
14 years 9 months ago
Intelligent Integrated Management for Telecommunication Networks
As the size of communication networks keeps on growing, faster connections, cooperating technologies and the divergence of equipment and data communications, the management of the...
Antonio Martín, Carlos León, F&eacut...
FEDCSIS
2011
87views more  FEDCSIS 2011»
13 years 11 months ago
Enhanced CakES representing Safety Analysis results of Embedded Systems
—Nowadays, embedded systems are widely used. It is extremely difficult to analyze safety issues in embedded systems, to relate the safety analysis results to the actual parts, a...
Yasmin I. Al-Zokari, Daniel Schneider, Dirk Zeckze...
VLSID
2002
IEEE
177views VLSI» more  VLSID 2002»
16 years 5 days ago
RTL-Datapath Verification using Integer Linear Programming
Satisfiability of complex word-level formulas often arises as a problem in formal verification of hardware designs described at the register transfer level (RTL). Even though most...
Raik Brinkmann, Rolf Drechsler