Sciweavers

16859 search results - page 3195 / 3372
» Generative software development
Sort
View
ICDM
2008
IEEE
186views Data Mining» more  ICDM 2008»
15 years 8 months ago
xCrawl: A High-Recall Crawling Method for Web Mining
Web Mining Systems exploit the redundancy of data published on the Web to automatically extract information from existing web documents. The first step in the Information Extract...
Kostyantyn M. Shchekotykhin, Dietmar Jannach, Gerh...
ICRA
2008
IEEE
183views Robotics» more  ICRA 2008»
15 years 8 months ago
Hybrid image-plane/stereo (HIPS) for orientation control of manipulators
— Planetary exploration systems, operating under severe environmental and operating conditions, have thus far successfully employed carefully calibrated stereo cameras and manipu...
Kevin Nickels
NDSS
2008
IEEE
15 years 8 months ago
Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority
We study and document an important development in how attackers are using Internet resources: the creation of malicious DNS resolution paths. In this growing form of attack, victi...
David Dagon, Niels Provos, Christopher P. Lee, Wen...
NOCS
2008
IEEE
15 years 8 months ago
Network Simplicity for Latency Insensitive Cores
In this paper we examine a latency insensitive network composed of very fast and simple circuits that connects SoC cores that are also latency insensitive, de-synchronized, or asy...
Daniel Gebhardt, JunBok You, W. Scott Lee, Kenneth...
PIMRC
2008
IEEE
15 years 8 months ago
The limits of theory: Pragmatic challenges in mobile ad hoc systems
—The development of mobile ad hoc systems have considerably emphasized the need for a better understanding of the factors that influence the systems’ performance, i.e., mobili...
Franck Legendre, Martin May, Vincent Lenders, Gunn...
« Prev « First page 3195 / 3372 Last » Next »