Sciweavers

729 search results - page 127 / 146
» And Or Hierarchies and Round Abstraction
Sort
View
SP
2008
IEEE
115views Security Privacy» more  SP 2008»
13 years 7 months ago
Complexity in scalable computing
f abstraction (hardware) to the highest (people). This issue's theme encompasses this entire spectrum. The lead author of each article resides in the Scalable Computing Resear...
Damian W. I. Rouson
IPM
2007
86views more  IPM 2007»
13 years 7 months ago
Document concept lattice for text understanding and summarization
We argue that the quality of a summary can be evaluated based on how many concepts in the original document(s) that reserved after summarization. Here, a concept refers to an abst...
Shiren Ye, Tat-Seng Chua, Min-Yen Kan, Long Qiu
TSMC
2008
134views more  TSMC 2008»
13 years 7 months ago
Expanding the Criteria for Evaluating Socio-Technical Software
Abstract--This paper compares two evaluation criterion frameworks for sociotechnical software. Research on the technology acceptance model (TAM) confirms that perceived usefulness ...
Brian Whitworth, Victor Bañuls, Cheickna Sy...
JNW
2007
113views more  JNW 2007»
13 years 7 months ago
Using Virtualization to Provide Interdomain QoS-enabled Routing
— Today, the most important aspect related with the Internet architecture is its ossification representing the difficulties to introduce evolutions in the architecture as a way...
Fábio Luciano Verdi, Maurício F. Mag...
TVLSI
2008
144views more  TVLSI 2008»
13 years 7 months ago
Reconfigurable Hardware for High-Security/ High-Performance Embedded Systems: The SAFES Perspective
Abstract--Embedded systems present significant security challenges due to their limited resources and power constraints. This paper focuses on the issues of building secure embedde...
Guy Gogniat, Tilman Wolf, Wayne P. Burleson, Jean-...