Sciweavers

43190 search results - page 8552 / 8638
» Can Development Be Designed
Sort
View
158
Voted
USENIX
2004
15 years 4 months ago
Trusted Path Execution for the Linux 2.6 Kernel as a Linux Security Module
The prevention of damage caused to a system via malicious executables is a significant issue in the current state of security on Linux operating systems. Several approaches are av...
Niki A. Rahimi
141
Voted
USENIX
2004
15 years 4 months ago
Making the "Box" Transparent: System Call Performance as a First-Class Result
For operating system intensive applications, the ability of designers to understand system call performance behavior is essential to achieving high performance. Conventional perfo...
Yaoping Ruan, Vivek S. Pai
127
Voted
NAACL
2003
15 years 4 months ago
TAP-XL: An Automated Analyst's Assistant
The TAP-XL Automated Analyst’s Assistant is an application designed to help an Englishspeaking analyst write a topical report, culling information from a large inflow of multili...
Sean Colbath, Francis Kubala
107
Voted
COLING
2000
15 years 4 months ago
A Model of Competence for Corpus-Based Machine Translation
A translation is a conversion from a source language into a target language preserving the meaning. A huge number of techniques and computational approaches have been experimented...
Michael Carl
WSCG
2003
167views more  WSCG 2003»
15 years 4 months ago
Vector-valued Image Restoration with Applications to Magnetic Resonance Velocity Imaging
The analysis of blood flow patterns and the interaction between salient topological flow features and cardiovascular structure plays an important role in the study of cardiovascul...
Yin-Heung Pauline Ng, Guang-Zhong Yang
« Prev « First page 8552 / 8638 Last » Next »