Sciweavers

580 search results - page 68 / 116
» Dependable domestic systems design: A socio-technical approa...
Sort
View
SEMWEB
2010
Springer
13 years 5 months ago
Exploiting Relation Extraction for Ontology Alignment
When multiple ontologies are used within one application system, aligning the ontologies is a prerequisite for interoperability and unhampered semantic navigation and search. Vario...
Elena Beisswanger
ACSAC
2008
IEEE
14 years 2 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
DAC
1999
ACM
14 years 8 months ago
Effects of Inductance on the Propagation Delay and Repeater Insertion in VLSI Circuits
- A closed form expression for the propagation delay of a CMOS gate driving a distributed RLC line is introduced that is within 5% of dynamic circuit simulations for a wide range o...
Yehea I. Ismail, Eby G. Friedman
ICS
2004
Tsinghua U.
14 years 1 months ago
Cluster prefetch: tolerating on-chip wire delays in clustered microarchitectures
The growing dominance of wire delays at future technology points renders a microprocessor communication-bound. Clustered microarchitectures allow most dependence chains to execute...
Rajeev Balasubramonian
DGO
2009
118views Education» more  DGO 2009»
13 years 8 months ago
Towards collaborative web-based impact assessment
Impact assessment (IA) is a key method for the legislator to evaluate policies, norms or regulations currently under development. Experts use IA to gather and analyze input from m...
Clemens Heidinger, Erik Buchmann, Klemens Böh...