Sciweavers

3011 search results - page 399 / 603
» Generating XML Based Specifications of Information Systems
Sort
View
IJCAI
1989
15 years 3 months ago
Layering Predictions: Flexible Use of Dialog Expectation in Speech Recognition
entional user behavior, we need a principled mannerAbstract for relaxing contextual constraints when they are violated.When computer speech recognition is used for problem In order...
Sheryl R. Young, Wayne H. Ward, Alexander G. Haupt...
LCPC
2005
Springer
15 years 7 months ago
Analytic Models and Empirical Search: A Hybrid Approach to Code Optimization
Compilers employ system models, sometimes implicitly, to make code optimization decisions. These models are analytic; they reflect their implementor’s understanding and beliefs ...
Arkady Epshteyn, María Jesús Garzar&...
BMCBI
2010
125views more  BMCBI 2010»
15 years 1 months ago
Compartmentalization of the Edinburgh Human Metabolic Network
Background: Direct in vivo investigation of human metabolism is complicated by the distinct metabolic functions of various sub-cellular organelles. Diverse micro-environments in d...
Tong Hao, Hongwu Ma, Xue-Ming Zhao, Igor Goryanin
JSS
2006
82views more  JSS 2006»
15 years 1 months ago
Packaging experiences for improving testing technique selection
One of the major problems within the software testing area is how to get a suitable set of cases to test a software system. A good set of test cases should assure maximum effectiv...
Sira Vegas, Natalia Juristo Juzgado, Victor R. Bas...
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
15 years 8 months ago
Practical Proactive Integrity Preservation: A Basis for Malware Defense
Unlike today’s reactive approaches, information flow based approaches can provide positive assurances about overall system integrity, and hence can defend against sophisticated...
Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karan...