Sciweavers

3653 search results - page 5 / 731
» Analyzing language development from a network approach
Sort
View
125
Voted
DSN
2008
IEEE
15 years 10 months ago
Analyzing the effects of disk-pointer corruption
The long-term availability of data stored in a file system depends on how well it safeguards on-disk pointers used to access the data. Ideally, a system would correct all pointer...
Lakshmi N. Bairavasundaram, Meenali Rungta, Nitin ...
142
Voted
AINA
2007
IEEE
15 years 10 months ago
Building Web-Base SIP Analyzer with Ajax Approach
Web applications are generally less interactive than desktop applications. Due to the simple request-response model between web browsers and web servers, users usually experience ...
Quincy Wu, Yan-Hsiang Wang
129
Voted
COCOON
2008
Springer
15 years 5 months ago
A Linear Programming Duality Approach to Analyzing Strictly Nonblocking d-ary Multilog Networks under General Crosstalk Constrai
When a switching network topology is used for constructing optical cross-connects, as in the circuit switching case, no two routes are allowed to share a link. However, if two rou...
Hung Q. Ngo, Yang Wang 0014, Anh Le
110
Voted
UML
2005
Springer
15 years 9 months ago
Dynamic Secure Aspect Modeling with UML: From Models to Code
Abstract. Security engineering deals with modeling, analysis, and implementation of complex security mechanisms. The dynamic nature of such mechanisms makes it difficult to anticip...
Jan Jürjens, Siv Hilde Houmb
72
Voted
LREC
2010
123views Education» more  LREC 2010»
15 years 5 months ago
Developing Morphological Analysers for South Asian Languages: Experimenting with the Hindi and Gujarati Languages
A considerable amount of work has been put into development of stemmers and morphological analysers. The majority of these approaches use hand-crafted suffix-replacement rules but...
Niraj Aswani, Robert J. Gaizauskas