Sciweavers

354 search results - page 66 / 71
» A Technique and Markup Language for Business Process Automat...
Sort
View
ESTIMEDIA
2006
Springer
13 years 11 months ago
Use of a Bit-true Data Flow Analysis for Processor-Specific Source Code Optimization
Nowadays, key characteristics of a processor's instruction set are only exploited in high-level languages by using inline assembly or compiler intrinsics. Inserting intrinsic...
Heiko Falk, Jens Wagner, André Schaefer
SIES
2010
IEEE
13 years 5 months ago
Verification of a CAN bus model in SystemC with functional coverage
Abstract--Many heterogeneous embedded systems, for example industrial automation and automotive applications, require hard-real time constraints to be exhaustively verified - which...
Christoph Kuznik, Gilles B. Defo, Wolfgang Mü...
WISE
2003
Springer
14 years 20 days ago
Ontology Generation from Tables
At the heart of today’s information-explosion problems are issues involving semantics, mutual understanding, concept matching, and interoperability. Ontologies and the Semantic ...
Yuri A. Tijerino, David W. Embley, Deryle W. Lonsd...
KDD
1997
ACM
169views Data Mining» more  KDD 1997»
13 years 11 months ago
Learning to Extract Text-Based Information from the World Wide Web
Thereis a wealthof informationto be minedfromnarrative text on the WorldWideWeb.Unfortunately, standard natural language processing (NLP)extraction techniques expect full, grammat...
Stephen Soderland
USITS
1997
13 years 8 months ago
SPAND: Shared Passive Network Performance Discovery
In the Internet today, users and applications must often make decisions based on the performance they expect to receive from other Internet hosts. For example, users can often vie...
Srinivasan Seshan, Mark Stemm, Randy H. Katz