Sciweavers

762 search results - page 98 / 153
» Conditionally correct superoptimization
Sort
View
SDM
2009
SIAM
105views Data Mining» more  SDM 2009»
14 years 7 months ago
Exploiting Semantic Constraints for Estimating Supersenses with CRFs.
The annotation of words and phrases by ontology concepts is extremely helpful for semantic interpretation. However many ontologies, e.g. WordNet, are too fine-grained and even hu...
Gerhard Paaß, Frank Reichartz
SAC
2010
ACM
14 years 4 months ago
Checking concurrent contracts with aspects
The applicability of aspects as a means of implementing runtime contract checking has been demonstrated in prior work, where contracts are identified as cross-cutting concerns [1...
Eric Kerfoot, Steve McKeever
FASE
2009
Springer
14 years 4 months ago
Transformation of Type Graphs with Inheritance for Ensuring Security in E-Government Networks
Abstract. E-government services usually process large amounts of confidential data. Therefore, security requirements for the communication between components have to be adhered in...
Frank Hermann, Hartmut Ehrig, Claudia Ermel
PERVASIVE
2009
Springer
14 years 4 months ago
Situvis: A Visual Tool for Modeling a User's Behaviour Patterns in a Pervasive Environment
Abstract. One of the key challenges faced when developing contextaware pervasive systems is to capture the set of inputs that we want a system to adapt to. Arbitrarily specifying r...
Adrian K. Clear, Ross Shannon, Thomas Holland, Aar...
DATE
2009
IEEE
122views Hardware» more  DATE 2009»
14 years 4 months ago
A highly resilient routing algorithm for fault-tolerant NoCs
Current trends in technology scaling foreshadow worsening transistor reliability as well as greater numbers of transistors in each system. The combination of these factors will so...
David Fick, Andrew DeOrio, Gregory K. Chen, Valeri...