Sciweavers

668 search results - page 63 / 134
» Implementing and Evaluating Automatic Checkpointing
Sort
View
164
Voted
LBM
2007
15 years 4 months ago
Syntactic Features for Protein-Protein Interaction Extraction
Background: Extracting Protein-Protein Interactions (PPI) from research papers is a way of translating information from English to the language used by the databases that store th...
Rune Sætre, Kenji Sagae, Jun-ichi Tsujii
118
Voted
EDOC
2006
IEEE
15 years 8 months ago
Trust Assessment Using Provenance in Service Oriented Applications
Workflow forms a key part of many existing Service Oriented applications, involving the integration of services that may be made available at distributed sites. It is possible ng...
Shrija Rajbhandari, Arnaud Contes, Omer F. Rana, V...
112
Voted
INFOCOM
2006
IEEE
15 years 8 months ago
Achieving Repeatability of Asynchronous Events in Wireless Sensor Networks with EnviroLog
— Sensing events from dynamic environments are normally asynchronous and non-repeatable. This lack of repeatability makes it particularly difficult to statistically evaluate the...
Liqian Luo, Tian He, Gang Zhou, Lin Gu, Tarek F. A...
105
Voted
CSCW
2004
ACM
15 years 8 months ago
Instant messages: a framework for reading between the lines
A framework is described for analyzing keystroke level data from instant messages (IM). This is unlike other analyses of IM which employ server-based logs of messages. This framew...
Jeffrey D. Campbell
116
Voted
CEC
2007
IEEE
15 years 4 months ago
Fitness inheritance in evolutionary and multi-objective high-level synthesis
Abstract—The high-level synthesis process allows the automatic design and implementation of digital circuits starting from a behavioral description. Evolutionary algorithms are v...
Christian Pilato, Gianluca Palermo, Antonino Tumeo...