Sciweavers

694 search results - page 116 / 139
» Comparison of software architecture reverse engineering meth...
Sort
View
WWW
2002
ACM
16 years 13 days ago
Probabilistic question answering on the web
Web-based search engines such as Google and NorthernLight return documents that are relevant to a user query, not answers to user questions. We have developed an architecture that...
Dragomir R. Radev, Weiguo Fan, Hong Qi, Harris Wu,...
WWW
2004
ACM
16 years 13 days ago
Site-to-site (s2s) searching using the p2p framework with cgi
Peer-To-Peer (P2P) networks like Gnutella improve some shortcomings of Conventional Search Engines (CSE) such as centralized and outdated indexing by distributing the search engin...
Wan Yeung Wong
CORR
1998
Springer
184views Education» more  CORR 1998»
14 years 11 months ago
Case Study in Survivable Network System Analysis
This paper presents a method for analyzing the survivability of distributed network systems and an example of its application. Survivability is the capability of a system to fulfi...
Robert J. Ellison, Richard C. Linger, Thomas A. Lo...
CGO
2003
IEEE
15 years 5 months ago
Addressing Mode Selection
Many processor architectures provide a set of addressing modes in their address generation units. For example DSPs (digital signal processors) have powerful addressing modes for e...
Erik Eckstein, Bernhard Scholz
COMPSAC
2001
IEEE
15 years 3 months ago
Utilizing Object-Oriented Databases for Concurrency Control in Virtual Environments
Virtual Reality Modeling Language (VRML) is widely used to represent, create, and display virtual reality objects and their environment. Some VRML applications require concurrent ...
Damla Turgut, Nevin Aydin, Ramez Elmasri, Begumhan...