Sciweavers

193 search results - page 34 / 39
» Conditional Dependence Networks in Requirements Engineering
Sort
View
IPPS
2009
IEEE
15 years 4 months ago
Input-independent, scalable and fast string matching on the Cray XMT
String searching is at the core of many security and network applications like search engines, intrusion detection systems, virus scanners and spam filters. The growing size of o...
Oreste Villa, Daniel G. Chavarría-Miranda, ...
EMSOFT
2006
Springer
15 years 1 months ago
New approach to architectural synthesis: incorporating QoS constraint
Embedded applications like video decoding, video streaming and those in the network domain, typically have a Quality of Service (QoS) requirement which needs to be met. Apart from...
Harsh Dhand, Basant Kumar Dwivedi, M. Balakrishnan
66
Voted
IOR
2010
75views more  IOR 2010»
14 years 8 months ago
Confronting Entrenched Insurgents
During counterinsurgency operations, government forces with superior …repower confront weaker lowsignature insurgents. Under what conditions should government (Blue) forces atta...
Edward H. Kaplan, Moshe Kress, Roberto Szechtman
SIGSOFT
2008
ACM
15 years 10 months ago
Doloto: code splitting for network-bound web 2.0 applications
Modern Web 2.0 applications, such as GMail, Live Maps, Facebook and many others, use a combination of Dynamic HTML, JavaScript and other Web browser technologies commonly referred...
V. Benjamin Livshits, Emre Kiciman
TASLP
2011
14 years 4 months ago
A Generative Student Model for Scoring Word Reading Skills
—This paper presents a novel student model intended to automate word-list-based reading assessments in a classroom setting, specifically for a student population that includes b...
Joseph Tepperman, Sungbok Lee, Shrikanth Narayanan...