Sciweavers

596 search results - page 72 / 120
» Providing Automatic Support for Heuristic Rules of Methods
Sort
View
JSA
1998
72views more  JSA 1998»
14 years 9 months ago
Network conscious design of distributed real-time systems
In this paper, we present a network conscious approach to designing distributed real-time systems. Given a task graph design of the system, the end-to-end constraints on the input...
Jung Woo Park, Young Shin Kim, Seongsoo Hong, Mana...
KDD
2010
ACM
318views Data Mining» more  KDD 2010»
14 years 8 months ago
DivRank: the interplay of prestige and diversity in information networks
Information networks are widely used to characterize the relationships between data items such as text documents. Many important retrieval and mining tasks rely on ranking the dat...
Qiaozhu Mei, Jian Guo, Dragomir R. Radev
EMNLP
2009
14 years 7 months ago
Sinuhe - Statistical Machine Translation using a Globally Trained Conditional Exponential Family Translation Model
We present a new phrase-based conditional exponential family translation model for statistical machine translation. The model operates on a feature representation in which sentenc...
Matti Kääriäinen
ICSE
2012
IEEE-ACM
13 years 3 days ago
Predicting performance via automated feature-interaction detection
Abstract—Customizable programs and program families provide user-selectable features to allow users to tailor a program to an application scenario. Knowing in advance which featu...
Norbert Siegmund, Sergiy S. Kolesnikov, Christian ...
DBSEC
1996
125views Database» more  DBSEC 1996»
14 years 11 months ago
A Framework for High Assurance Security of Distributed Objects
High assurance security is di cult to achieve in distributed computer systems and databases because of their complexity, non-determinism and inherent heterogeneity. The practical ...
John Hale, Jody Threet, Sujeet Shenoi