Sciweavers

4359 search results - page 217 / 872
» Automated Pipeline Design
Sort
View
148
Voted
AMET
1998
Springer
15 years 8 months ago
Bid Evaluation and Selection in the MAGNET Automated Contracting System
We present an approach to the bid-evaluation problem in a system for multi-agent contract negotiation, called MAGNET. The MAGNET market infrastructure provides support for a variet...
Erik S. Steinmetz, John Collins, Scott Jamison, Ra...
125
Voted
MM
1996
ACM
120views Multimedia» more  MM 1996»
15 years 7 months ago
Negotiation for Automated Generation of Temporal Multimedia Presentations
Creating high-quality multimediapresentationsrequiresmuch skill, time, and effort. This is particularly true when temporal media, such as speech and animation, are involved. We de...
Mukesh Dalal, Steven Feiner, Kathleen McKeown, Shi...
113
Voted
SP
2010
IEEE
140views Security Privacy» more  SP 2010»
15 years 7 months ago
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
Abstract—Unfortunately, malicious software is still an unsolved problem and a major threat on the Internet. An important component in the fight against malicious software is the...
Clemens Kolbitsch, Thorsten Holz, Christopher Krue...
121
Voted
CASES
2005
ACM
15 years 5 months ago
Automating custom-precision function evaluation for embedded processors
Due to resource and power constraints, embedded processors often cannot afford dedicated floating-point units. For instance, the IBM PowerPC processor embedded in Xilinx Virtex-...
Ray C. C. Cheung, Dong-U Lee, Oskar Mencer, Wayne ...
129
Voted
ER
2008
Springer
136views Database» more  ER 2008»
15 years 5 months ago
Automating the Extraction of Rights and Obligations for Regulatory Compliance
Abstract. Government regulations are increasingly affecting the security, privacy and governance of information systems in the United States, Europe and elsewhere. Consequently, co...
Nadzeya Kiyavitskaya, Nicola Zeni, Travis D. Breau...