Sciweavers

11722 search results - page 198 / 2345
» How Developers Develop Features
Sort
View
FPCA
1995
15 years 6 months ago
How Much Non-Strictness do Lenient Programs Require?
Lenient languages, such as Id90, have been touted as among the best functional languages for massively parallel machines AHN88]. Lenient evaluation combines non-strict semantics w...
Klaus E. Schauser, Seth Copen Goldstein
116
Voted
WSC
2008
15 years 4 months ago
How to build valid and credible simulation models
In this tutorial we present techniques for building valid and credible simulation models. Ideas to be discussed include the importance of a definitive problem formulation, discuss...
Averill M. Law
122
Voted
ASPLOS
2008
ACM
15 years 4 months ago
How low can you go?: recommendations for hardware-supported minimal TCB code execution
We explore the extent to which newly available CPU-based security technology can reduce the Trusted Computing Base (TCB) for security-sensitive applications. We find that although...
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Mi...
118
Voted
LREC
2010
185views Education» more  LREC 2010»
15 years 4 months ago
How Certain are Clinical Assessments? Annotating Swedish Clinical Text for (Un)certainties, Speculations and Negations
Clinical texts contain a large amount of information. Some of this information is embedded in contexts where e.g. a patient status is reasoned about, which may lead to a considera...
Hercules Dalianis, Sumithra Velupillai
98
Voted
LREC
2010
146views Education» more  LREC 2010»
15 years 4 months ago
From XML to XML: The Why and How of Making the Biodiversity Literature Accessible to Researchers
We present the ABLE document collection, which consists of a set of annotated volumes of the Bulletin of the British Museum (Natural History). These were developed during our ongo...
Alistair Willis, David King, David Morse, Anton Di...