Sciweavers

1051 search results - page 171 / 211
» Analyzing Resource Behavior Using Process Mining
Sort
View
SOSP
2003
ACM
15 years 9 months ago
Implementing an untrusted operating system on trusted hardware
Recently, there has been considerable interest in providing “trusted computing platforms” using hardware — TCPA and Palladium being the most publicly visible examples. In th...
David Lie, Chandramohan A. Thekkath, Mark Horowitz
SI3D
1992
ACM
15 years 4 months ago
Interactive Volume Rendering on a Multicomputer
Direct volume rendering is a computationally intensive operation that has become a valued and often preferred visualization tool. For maximal data comprehension, interactive manip...
Ulrich Neumann
LREC
2008
137views Education» more  LREC 2008»
15 years 1 months ago
Elicited Imitation as an Oral Proficiency Measure with ASR Scoring
This paper discusses development and evaluation of a practical, valid and reliable instrument for evaluating the spoken language abilities of second-language (L2) learners of Engl...
C. Ray Graham, Deryle Lonsdale, Casey Kennington, ...
99
Voted
ESCIENCE
2006
IEEE
15 years 6 months ago
Job Failure Analysis and Its Implications in a Large-Scale Production Grid
In this paper we present an initial analysis of job failures in a large-scale data-intensive Grid. Based on three representative periods in production, we characterize the interar...
Hui Li, David L. Groep, Lex Wolters, Jeffrey Templ...
136
Voted
BMCBI
2008
149views more  BMCBI 2008»
15 years 19 days ago
All-paths graph kernel for protein-protein interaction extraction with evaluation of cross-corpus learning
Background: Automated extraction of protein-protein interactions (PPI) is an important and widely studied task in biomedical text mining. We propose a graph kernel based approach ...
Antti Airola, Sampo Pyysalo, Jari Björne, Tap...