Sciweavers

2084 search results - page 404 / 417
» Knowledge Exploitation from the Web
Sort
View
ERCIMDL
2001
Springer
205views Education» more  ERCIMDL 2001»
14 years 11 days ago
Building and Indexing a Distributed Multimedia Presentation Archive Using SMIL
This paper proposes an approach to the problem of generating metadata for composite mixed-media digital objects by appropriately combining and exploiting existing knowledge or met...
Jane Hunter, Suzanne Little
ICSE
1999
IEEE-ACM
14 years 4 days ago
Using a Goal-Driven Approach to Generate Test Cases for GUIs
The widespread use of GUIs for interacting with software is leading to the construction of more and more complex GUIs. With the growing complexity comes challenges in testing the ...
Atif M. Memon, Martha E. Pollack, Mary Lou Soffa
GLVLSI
2009
IEEE
158views VLSI» more  GLVLSI 2009»
13 years 11 months ago
Exploration of memory hierarchy configurations for efficient garbage collection on high-performance embedded systems
Modern embedded devices (e.g., PDAs, mobile phones) are now incorporating Java as a very popular implementation language in their designs. These new embedded systems include multi...
José Manuel Velasco, David Atienza, Katzali...
ATAL
2006
Springer
13 years 11 months ago
Robust recognition of physical team behaviors using spatio-temporal models
This paper presents a framework for robustly recognizing physical team behaviors by exploiting spatio-temporal patterns. Agent team behaviors in athletic and military domains typi...
Gita Sukthankar, Katia P. Sycara
EMSOFT
2006
Springer
13 years 11 months ago
New approach to architectural synthesis: incorporating QoS constraint
Embedded applications like video decoding, video streaming and those in the network domain, typically have a Quality of Service (QoS) requirement which needs to be met. Apart from...
Harsh Dhand, Basant Kumar Dwivedi, M. Balakrishnan