Sciweavers

1478 search results - page 171 / 296
» Modeling user activities in a large IPTV system
Sort
View
DSML
2008
107views Formal Methods» more  DSML 2008»
15 years 3 months ago
How Web 2.0 can Leverage Model Engineering in Practice
: Today's online model repositories offer to download and view the textual specifications of e.g. metamodels and models in the browser. For users, in order to efficiently sear...
Manuel Wimmer, Andrea Schauerhuber, Michael Stromm...
HICSS
1994
IEEE
106views Biometrics» more  HICSS 1994»
15 years 5 months ago
Trace-Driven Simulation of Decoupled Architectures
The development of accurate trace-driven simulation models has become a key activity in the design of new high-performance computer systems. Tracedriven simulation is fast) enabli...
Sathiamoorthy Manoharan, Nigel P. Topham, A. W. R....
RV
2007
Springer
151views Hardware» more  RV 2007»
15 years 7 months ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan
RIVF
2007
15 years 3 months ago
Thai Speech Keyword Spotting using Heterogeneous Acoustic Modeling
This paper illustrates the use of acoustic modeling of spoken dialog systems. One major problem with using speech three different structures, including syllables, fillers and recog...
S. Tangruamsub, Proadpran Punyabukkana, Atiwong Su...
WWW
2007
ACM
16 years 2 months ago
Multi-factor clustering for a marketplace search interface
Search engines provide a small window to the vast repository of data they index and against which they search. They try their best to return the documents that are of relevance to...
Neel Sundaresan, Kavita Ganesan, Roopnath Grandhi