Sciweavers

2913 search results - page 307 / 583
» How Much to Copy
Sort
View
COMAD
2008
15 years 5 months ago
Exploiting Asynchronous IO using the Asynchronous Iterator Model
Asynchronous IO (AIO) allows a process to continue to do other work while an IO operation initiated earlier completes. AIO allows a large number of random IO operations to be issu...
Suresh Iyengar, S. Sudarshan, Santosh Kumar 0002, ...
DMS
2008
161views Multimedia» more  DMS 2008»
15 years 5 months ago
A Method to Diagnose Self-weaknesses for Software Development Organizations
A root cause is a source of a defect such that if it is removed, the defect is subsequently decreased or removed. By analyzing the root causes of defects of our software projects,...
Chi-Lu Yang, Yeim-Kuan Chang, Chih-Ping Chu
130
Voted
LREC
2008
110views Education» more  LREC 2008»
15 years 5 months ago
Information Extraction Tools and Methods for Understanding Dialogue in a Companion
This paper discusses how Information Extraction is used to understand and manage Dialogue in the EU-funded Companions project. This will be discussed with respect to the Senior Co...
Roberta Catizone, Alexiei Dingli, Hugo Pinto, Yori...
115
Voted
LREC
2008
146views Education» more  LREC 2008»
15 years 5 months ago
Estimating the Resource Adaption Cost from a Resource Rich Language to a Similar Resource Poor Language
Developing resources which can be used for Natural Language Processing is an extremely difficult task for any language, but is even more so for less privileged (or less computeriz...
Anil Kumar Singh, Kiran Pala, Harshit Surana
137
Voted
SEC
2008
15 years 5 months ago
Hiding in Groups: On the Expressiveness of Privacy Distributions
Many applications inherently disclose information because perfect privacy protection is prohibitively expensive. RFID tags, for example, cannot be equipped with the cryptographic p...
Karsten Nohl, David Evans