Sciweavers

18094 search results - page 3534 / 3619
» The Architecture of Secure Systems
Sort
View
PDPTA
2003
15 years 25 days ago
An Interactive Tuning Support for Processor Allocation of Data-Driven Realtime Programs
This paper presents the effectiveness of an interactive support facility to tune processor allocation of data-driven realtime programs on CUE (Coordinating Users’ requirements an...
Yasuhiro Wabiko, Hiroaki Nishikawa
PICS
2000
15 years 25 days ago
CCD Requirements for Digital Photography
Digital photography has the potential to supersede conventional film photography. In order to realize this potential, digital photography needs to provide the best image quality a...
Richard L. Baer
OSDI
1994
ACM
15 years 24 days ago
Performance Issues in Parallelized Network Protocols
Parallel processing has been proposed as a means of improving network protocol throughput. Several different strategies have been taken towards parallelizing protocols. A relative...
Erich M. Nahum, David J. Yates, James F. Kurose, D...
AAAI
1990
15 years 19 days ago
AI and Software Engineering: Will the Twain Ever Meet?
This session will explore the reasons for the lack of impact in four important areas in which AI has been expected to significantly affect real world Software Engineering. The pan...
Robert Balzer
CIDR
2009
129views Algorithms» more  CIDR 2009»
15 years 17 days ago
Extracting and Querying a Comprehensive Web Database
Recent research in domain-independent information extraction holds the promise of an automatically-constructed structured database derived from the Web. A query system based on th...
Michael J. Cafarella
« Prev « First page 3534 / 3619 Last » Next »