Sciweavers

22358 search results - page 4277 / 4472
» Software Performance Engineering
Sort
View
SCHEDULING
2010
104views more  SCHEDULING 2010»
14 years 10 months ago
A fluid approach to large volume job shop scheduling
We consider large volume job shop scheduling problems, in which there is a fixed number of machines, a bounded number of activities per job, and a large number of jobs. In large v...
Yoni Nazarathy, Gideon Weiss
SIGIR
2010
ACM
14 years 10 months ago
PRES: a score metric for evaluating recall-oriented information retrieval applications
Information retrieval (IR) evaluation scores are generally designed to measure the effectiveness with which relevant documents are identified and retrieved. Many scores have been ...
Walid Magdy, Gareth J. F. Jones
SPEECH
2010
154views more  SPEECH 2010»
14 years 10 months ago
Long story short - Global unsupervised models for keyphrase based meeting summarization
act 11 We analyze and compare two different methods for unsupervised extractive spontaneous speech summarization in the meeting 12 domain. Based on utterance comparison, we introdu...
Korbinian Riedhammer, Benoît Favre, Dilek Ha...
TON
2010
93views more  TON 2010»
14 years 10 months ago
Design and field experimentation of an energy-efficient architecture for DTN throwboxes
Disruption tolerant networks rely on intermittent contacts between mobile nodes to deliver packets using a storecarry-and-forward paradigm. We earlier proposed the use of throwbox ...
Nilanjan Banerjee, Mark D. Corner, Brian Neil Levi...
TSE
2010
230views more  TSE 2010»
14 years 10 months ago
Vulnerability Discovery with Attack Injection
The increasing reliance put on networked computer systems demands higher levels of dependability. This is even more relevant as new threats and forms of attack are constantly being...
João Antunes, Nuno Ferreira Neves, Miguel C...
« Prev « First page 4277 / 4472 Last » Next »