Sciweavers

275 search results - page 54 / 55
» Reengineering Class Hierarchies Using Concept Analysis
Sort
View
SIGIR
2009
ACM
15 years 9 months ago
Good abandonment in mobile and PC internet search
Query abandonment by search engine users is generally considered to be a negative signal. In this paper, we explore the concept of good abandonment. We define a good abandonment ...
Jane Li, Scott B. Huffman, Akihito Tokuda
110
Voted
DSD
2009
IEEE
144views Hardware» more  DSD 2009»
15 years 10 months ago
Composable Resource Sharing Based on Latency-Rate Servers
Abstract—Verification of application requirements is becoming a bottleneck in system-on-chip design, as the number of applications grows. Traditionally, the verification comple...
Benny Akesson, Andreas Hansson, Kees Goossens
SIAMCOMP
1998
113views more  SIAMCOMP 1998»
15 years 3 months ago
Two-Dimensional Periodicity in Rectangular Arrays
Abstract. String matching is rich with a variety of algorithmic tools. In contrast, multidimensional matching has had a rather sparse set of techniques. This paper presents a new a...
Amihood Amir, Gary Benson
150
Voted
ESCIENCE
2006
IEEE
15 years 9 months ago
Workflow-Driven Ontologies: An Earth Sciences Case Study
A goal of the Geosciences Network (GEON) is to develop cyber-infrastructure that will allow earth scientists to discover access, integrate and disseminate knowledge in distributed...
Leonardo Salayandia, Paulo Pinheiro da Silva, Ann ...
143
Voted
SACMAT
2003
ACM
15 years 8 months ago
Cooperative role-based administration
In large organizations the administration of access privileges (such as the assignment of an access right to a user in a particular role) is handled cooperatively through distribu...
Horst Wedde, Mario Lischka