Sciweavers

452 search results - page 80 / 91
» Is home network application acceptable or not
Sort
View
SIGSOFT
2008
ACM
14 years 8 months ago
Deriving input syntactic structure from execution
Program input syntactic structure is essential for a wide range of applications such as test case generation, software debugging and network security. However, such important info...
Zhiqiang Lin, Xiangyu Zhang
AIME
2007
Springer
14 years 1 months ago
Inference in the Promedas Medical Expert System
Abstract. In the current paper, the Promedas model for internal medicine, developed by our team, is introduced. The model is based on up-todate medical knowledge and consists of ap...
Bastian Wemmenhove, Joris M. Mooij, Wim Wiegerinck...
OTM
2007
Springer
14 years 1 months ago
Spontaneous Privacy Policy Negotiations in Pervasive Environments
Abstract. Privacy issues are a major burden for the acceptance of pervasive applications. They may ultimately result in the rejection of new services despite their functional bene...
Sören Preibusch
FIRBPERF
2005
IEEE
259views Algorithms» more  FIRBPERF 2005»
14 years 1 months ago
Performance Issues in Video Streaming Environments
The main motivation for applying capacity planning techniques to the design of Internet-based video services is that very often these systems incur significant delays that decrea...
Giuliano Casale, Paolo Cremonesi, Giuseppe Serazzi...
ISCA
2003
IEEE
101views Hardware» more  ISCA 2003»
14 years 23 days ago
Overcoming the Limitations of Conventional Vector Processors
Despite their superior performance for multimedia applications, vector processors have three limitations that hinder their widespread acceptance. First, the complexity and size of...
Christoforos E. Kozyrakis, David A. Patterson