One way to exploit Thread Level Parallelism (TLP) is to use architectures that implement novel multithreaded execution models, like Scheduled DataFlow (SDF). This latter model pro...
Despite continuing advances in machine translation technology, users who lack familiarity with particular foreign languages have no good way to find information in those languages...
Boris Katz, Gary C. Borchardt, Sue Felshin, Yuan K...
Effective usage of multimedia digital libraries has to deal with the problem of building efficient content annotation and retrieval tools. In this paper Multimedia Ontologies, th...
Andrew D. Bagdanov, Marco Bertini, Alberto Del Bim...
Abstract—This paper presents a fully decentralized link adaptation algorithm to manage interference in an ad hoc network operating in TDD mode. The algorithm, called busy tone in...
Patrick Agyapong, Harald Haas, Alexander Tyrrell, ...
Defence trees and CP-net (ceteris paribus network) are two useful approaches that can be used to help a system administrator to analyze a security scenario and to give him a model ...