Sciweavers

6770 search results - page 1285 / 1354
» How GPUs Work
Sort
View
ECIS
2000
13 years 9 months ago
Reclaiming Knowledge: A Case for Evidence-Based Information Systems
: Both the information base, on which IS research and practice is founded, and its accessibility continue to grow rapidly. A major challenge facing the IS community in the next dec...
Clare Atkins, Gail Louw
FIW
1998
130views Communications» more  FIW 1998»
13 years 9 months ago
A Heuristic Approach to Detect Feature Interactions in Requirements
We present a method to systematically detect feature interactions in requirements, which are expressed as constraints on system event traces. We show its application on the lift sy...
Maritta Heisel, Jeanine Souquières
ANLP
1997
137views more  ANLP 1997»
13 years 9 months ago
Probabilistic and Rule-Based Tagger of an Inflective Language- a Comparison
We present results of probabilistic tagging of Czech texts in order to show how these techniques work for one of the highly morphologically ambiguous inflective languages. After d...
Jan Hajic, Barbora Hladká
FTCS
1997
115views more  FTCS 1997»
13 years 9 months ago
Robust Emulation of Shared Memory Using Dynamic Quorum-Acknowledged Broadcasts
This paper presents robust emulation of multi-writer/multi-reader registers in message-passing systems using dynamic quorum con gurations. In addition to processor and link failur...
Nancy A. Lynch, Alexander A. Shvartsman
IJCAI
1997
13 years 9 months ago
Reasoning about Concurrent Execution Prioritized Interrupts, and Exogenous Actions in the Situation Calculus
As an alternative to planning, an approach to highlevel agent control based on concurrent program execution is considered. A formal definition in the situation calculus of such a ...
Giuseppe De Giacomo, Yves Lespérance, Hecto...
« Prev « First page 1285 / 1354 Last » Next »