Sciweavers

7080 search results - page 389 / 1416
» Designing High Integrity Systems Using Aspects
Sort
View
PCRCW
1997
Springer
15 years 8 months ago
ChaosLAN: Design and Implementation of a Gigabit LAN Using Chaotic Routing
In recent years, theChaos Project at theUniversityofWashingtonhas analyzed and simulated a dozen routing algorithms. Three new routing algorithms have been invented; of these, the...
Neil R. McKenzie, Kevin Bolding, Carl Ebeling, Law...
DSRT
2008
IEEE
15 years 10 months ago
Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines
Security and reliability are of paramount importance in designing and building real-time systems because any security failure can put the public and the environment at risk. In th...
Wissam Mallouli, Amel Mammar, Ana R. Cavalli
LREC
2010
166views Education» more  LREC 2010»
15 years 5 months ago
Large Scale Multilingual Broadcast Data Collection to Support Machine Translation and Distillation Technology Development
The development of technologies to address machine translation and distillation of multilingual broadcast data depends heavily on the collection of large volumes of material from ...
Kevin Walker, Christopher Caruso, Denise DiPersio
BIS
2007
173views Business» more  BIS 2007»
15 years 5 months ago
Natural Language Technology for Information Integration in Business Intelligence
Business intelligence requires the collecting and merging of information from many different sources, both structured and unstructured, in order to analyse for example financial ...
Diana Maynard, Horacio Saggion, Milena Yankova, Ka...
FLAIRS
2006
15 years 5 months ago
Design, Implementation and Performance Analysis of Pervasive Surveillance Networks
Pervasive surveillance implies the continuous tracking of multiple targets as they move about the monitored region. The tasks to be performed by a surveillance system are expresse...
Amit Goradia, Zhiwei Cen, Clayton Haffner, Ning Xi...