Sciweavers

3686 search results - page 556 / 738
» An Approach to a Trustworthy System Architecture Using Virtu...
Sort
View
AICOM
2004
100views more  AICOM 2004»
13 years 8 months ago
Query rewriting with symmetric constraints
Abstract. We address the problem of answering queries using expressive symmetric inter-schema constraints which allow to establish mappings between several heterogeneous informatio...
Christoph Koch
HUC
2009
Springer
14 years 22 days ago
Applying pervasive technologies to create economic incentives that alter consumer behavior
Economic incentives are a powerful way of shaping consumer behavior towards more commercially efficient and environmentally sustainable patterns. In this paper, we explore the id...
Tetsuo Yamabe, Vili Lehdonvirta, Hitoshi Ito, Hayu...
NAACL
2010
13 years 6 months ago
Joint Inference for Knowledge Extraction from Biomedical Literature
Knowledge extraction from online repositories such as PubMed holds the promise of dramatically speeding up biomedical research and drug design. After initially focusing on recogni...
Hoifung Poon, Lucy Vanderwende
DATE
2005
IEEE
144views Hardware» more  DATE 2005»
14 years 1 months ago
Context Sensitive Performance Analysis of Automotive Applications
Accurate timing analysis is key to efficient embedded system synthesis and integration. While industrial control software systems are developed using graphical models, such as Ma...
Jan Staschulat, Rolf Ernst, Andreas Schulze, Fabia...
ICANN
2007
Springer
14 years 3 hour ago
Text-Independent Speaker Authentication with Spiking Neural Networks
This paper presents a novel system that performs text-independent speaker authentication using new spiking neural network (SNN) architectures. Each speaker is represented by a set ...
Simei Gomes Wysoski, Lubica Benuskova, Nikola Kasa...