Sciweavers

9477 search results - page 47 / 1896
» Design is as Easy as Optimization
Sort
View
ICECCS
2005
IEEE
136views Hardware» more  ICECCS 2005»
15 years 10 months ago
Model-Based Design and Analysis of Permission-Based Security
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions rely on certai...
Jan Jürjens, Markus Lehrhuber, Guido Wimmel
LREC
2010
171views Education» more  LREC 2010»
15 years 6 months ago
Design and Development of Part-of-Speech-Tagging Resources for Wolof (Niger-Congo, spoken in Senegal)
In this paper, we report on the design of a part-of-speech-tagset for Wolof and on the creation of a semi-automatically annotated gold standard. The main motivation for this resou...
Cheikh M. Bamba Dione, Jonas Kuhn, Sina Zarrie&szl...
WCE
2007
15 years 5 months ago
Objective Methods for Analysing Unreplicated Factorial Designs
— There is not a method for analysing unreplicated factorial designs that performs well for various configurations of number and size of active effects. Moreover, the most popula...
Nuno Costa, Zulema Lopes Pereira
SISW
2005
IEEE
15 years 10 months ago
File System Design with Assured Delete
This paper describes a system that supports high availability of data, until the data should be expunged, at which time it is impossible to recover the data. This design supports ...
Radia J. Perlman
ANCS
2008
ACM
15 years 6 months ago
Design of a scalable network programming framework
Nearly all programmable commercial hardware solutions offered for high-speed networking systems are capable of meeting the performance and flexibility requirements of equipment ve...
Ben Wun, Patrick Crowley, Arun Raghunath