Sciweavers

1051 search results - page 171 / 211
» Analyzing Resource Behavior Using Process Mining
Sort
View
SOSP
2003
ACM
14 years 4 months ago
Implementing an untrusted operating system on trusted hardware
Recently, there has been considerable interest in providing “trusted computing platforms” using hardware — TCPA and Palladium being the most publicly visible examples. In th...
David Lie, Chandramohan A. Thekkath, Mark Horowitz
SI3D
1992
ACM
14 years 7 hour ago
Interactive Volume Rendering on a Multicomputer
Direct volume rendering is a computationally intensive operation that has become a valued and often preferred visualization tool. For maximal data comprehension, interactive manip...
Ulrich Neumann
LREC
2008
137views Education» more  LREC 2008»
13 years 9 months ago
Elicited Imitation as an Oral Proficiency Measure with ASR Scoring
This paper discusses development and evaluation of a practical, valid and reliable instrument for evaluating the spoken language abilities of second-language (L2) learners of Engl...
C. Ray Graham, Deryle Lonsdale, Casey Kennington, ...
ESCIENCE
2006
IEEE
14 years 2 months ago
Job Failure Analysis and Its Implications in a Large-Scale Production Grid
In this paper we present an initial analysis of job failures in a large-scale data-intensive Grid. Based on three representative periods in production, we characterize the interar...
Hui Li, David L. Groep, Lex Wolters, Jeffrey Templ...
BMCBI
2008
149views more  BMCBI 2008»
13 years 8 months ago
All-paths graph kernel for protein-protein interaction extraction with evaluation of cross-corpus learning
Background: Automated extraction of protein-protein interactions (PPI) is an important and widely studied task in biomedical text mining. We propose a graph kernel based approach ...
Antti Airola, Sampo Pyysalo, Jari Björne, Tap...