Sciweavers

2290 search results - page 434 / 458
» Extensible Protected Types
Sort
View
DAC
2008
ACM
13 years 9 months ago
SHIELD: a software hardware design methodology for security and reliability of MPSoCs
Security of MPSoCs is an emerging area of concern in embedded systems. Security is jeopardized by code injection attacks, which are the most common types of software attacks. Prev...
Krutartha Patel, Sri Parameswaran
DGO
2007
133views Education» more  DGO 2007»
13 years 9 months ago
A toolbox for the choice of indicator classes for ranking of watersheds
There has been considerable work on determining a suitable method to accomplish a satisfactory ordering of a group of objects, when there are multiple evaluation criteria. A weigh...
K. Sham Bhat
ECIR
2007
Springer
13 years 9 months ago
Combination of Document Priors in Web Information Retrieval
Query-independent features (also called document priors), such as the number of incoming links to a document, its Page-Rank, or the type of its associated URL, have been successfu...
Jie Peng, Iadh Ounis
EUMAS
2006
13 years 9 months ago
Agents Arguing over Ontology Alignments
ed Abstract Ontologies play an important role in inter-agent communication, by providing the definitions of the vocabularies used by agents to describe the world [4]. An agent can ...
Loredana Laera, Valentina A. M. Tamma, Jér&...
EUSFLAT
2003
131views Fuzzy Logic» more  EUSFLAT 2003»
13 years 9 months ago
From communication networks to fuzzy sets
In 1931 and 1935, Ernst Adolph Guillemin, professor of electrical engineering at Masachusetts Institute of Technology (MIT), published the two volumes of his book “Communication...
Rudolf Seising