Sciweavers

10577 search results - page 1981 / 2116
» Active Data Mining
Sort
View
JAR
2006
99views more  JAR 2006»
15 years 5 months ago
An Integrated Approach to High Integrity Software Verification
Using automated reasoning techniques, we tackle the niche activity of proving that a program is free from run-time exceptions. Such a property is particularly valuable in high inte...
Andrew Ireland, Bill J. Ellis, Andrew Cook, Roderi...
JUCS
2008
167views more  JUCS 2008»
15 years 5 months ago
A Generic Architecture for the Conversion of Document Collections into Semantically Annotated Digital Archives
: Mass digitization of document collections with further processing and semantic annotation is an increasing activity among libraries and archives at large for preservation, browsi...
Josep Lladós, Dimosthenis Karatzas, Joan Ma...
JUCS
2008
148views more  JUCS 2008»
15 years 5 months ago
Integrating Service-Oriented Mobile Units to Support Collaboration in Ad-hoc Scenarios
: Advances in wireless communication and mobile computing extend collaboration scenarios. Mobile workers using computing devices are currently able to collaborate in order to carry...
H. Andrés Neyem, Sergio F. Ochoa, Jos&eacut...
JUCS
2008
125views more  JUCS 2008»
15 years 5 months ago
Evaluation of Agent-based Interactive Systems: Proposal of an Electronic Informer Using Petri Nets
: The evaluation of interactive systems has been an active subject of research for many years. Many methods and tools have been proposed but most of them do not take architectural ...
Chi Dung Tran, Houcine Ezzedine, Christophe Kolski
JEC
2006
71views more  JEC 2006»
15 years 5 months ago
Destructive-read in embedded DRAM, impact on power consumption
This paper explores power consumption for destructive-read embedded DRAM. Destructive-read DRAM is based on conventional DRAM design, but with sense amplifiers optimized for lower ...
Haakon Dybdahl, Per Gunnar Kjeldsberg, Marius Gran...
« Prev « First page 1981 / 2116 Last » Next »