Sciweavers

580 search results - page 31 / 116
» A Requirements Elicitation Approach Based in Templates and P...
Sort
View
DATE
2005
IEEE
171views Hardware» more  DATE 2005»
14 years 1 months ago
Access Pattern-Based Code Compression for Memory-Constrained Embedded Systems
As compared to a large spectrum of performance optimizations, relatively little effort has been dedicated to optimize other aspects of embedded applications such as memory space r...
Ozcan Ozturk, Hendra Saputra, Mahmut T. Kandemir, ...
ANCS
2007
ACM
13 years 12 months ago
Optimization of pattern matching algorithm for memory based architecture
Due to the advantages of easy re-configurability and scalability, the memory-based string matching architecture is widely adopted by network intrusion detection systems (NIDS). In...
Cheng-Hung Lin, Yu-Tang Tai, Shih-Chieh Chang
MHCI
2005
Springer
14 years 1 months ago
Field-based mLearning: who wants what?
The real needs of end users of software technology are often neglected until it is too late. An approach is outlined that puts people before technology, and investigates the real ...
Paul Ryan, Enda Finn
JDCTA
2010
152views more  JDCTA 2010»
13 years 2 months ago
A Semantic Approach to Extract the Final Answer in SBUQA Question Answering System
In this paper we introduce the semantic approach of the answer extraction component of a question answering system called SBUQA. The answer extraction component gets the retrieved...
Mehrnoush Shamsfard, Mahsa Arab Yarmohammadi
KDD
2009
ACM
232views Data Mining» more  KDD 2009»
14 years 8 months ago
Classification of software behaviors for failure detection: a discriminative pattern mining approach
Software is a ubiquitous component of our daily life. We often depend on the correct working of software systems. Due to the difficulty and complexity of software systems, bugs an...
David Lo, Hong Cheng, Jiawei Han, Siau-Cheng Khoo,...