Errors are unavoidable in advanced computer vision applications such as optical character recognition, and the noise induced by these errors presents a serious challenge to downstr...
We present an analytical method to evaluate embedded network packet processor architectures, and to explore their design space. Our approach is in contrast to those based on simul...
Business rules are often implemented as stored procedures in a database server. These procedures are triggered by various clients, but the execution load is fully centralized on th...
This research throws light on to the role of social issues in developing a successful information system. In a case study of a community health organization, we describe how IT ma...
Abstract--While a number of modeling languages for constructing multiagent systems (MASs) have been suggested, none of them is widely accepted and used. A prominent reason for this...