Sciweavers

1733 search results - page 122 / 347
» Critical Information Systems Research: A Habermasian Approac...
Sort
View
RTCSA
2000
IEEE
15 years 6 months ago
Extracting safe and precise control flow from binaries
As a starting point for static program analysis a control flow graph (CFG) is needed. If only the binary executable is available, this CFG has to be reconstructed from sequences ...
Henrik Theiling
HICSS
2007
IEEE
141views Biometrics» more  HICSS 2007»
15 years 8 months ago
Challenges in Health Informatics
Early grand challenge papers in health informatics identified numerous challenges, many of which either remain as open questions or have been resolved within fairly narrow domains...
Michael A. Shepherd
ACL
2006
15 years 3 months ago
Phoneme-to-Text Transcription System with an Infinite Vocabulary
The noisy channel model approach is successfully applied to various natural language processing tasks. Currently the main research focus of this approach is adaptation methods, ho...
Shinsuke Mori, Daisuke Takuma, Gakuto Kurata
MSS
2000
IEEE
182views Hardware» more  MSS 2000»
15 years 6 months ago
A Blueprint for Representation Information in the OAIS Model
The CEDARS∗ project within UK academia seeks to develop a demonstrator system to recommend techniques for long-term storage of digital data primarily within the research library...
David Holdsworth, Derek M. Sergeant
NCA
2007
IEEE
15 years 7 months ago
Towards IQ-Appliances: Quality-awareness in Information Virtualization
Our research addresses two important problems that arise in modern large-scale distributed systems: (1) the necessity to virtualize their data flows by applying actions such as ï...
Radhika Niranjan, Ada Gavrilovska, Karsten Schwan,...