Sciweavers

2385 search results - page 351 / 477
» Knowledge Refinement for a Design System
Sort
View
112
Voted
DRM
2007
Springer
15 years 8 months ago
Digital rights management: desirable, inevitable, and almost irrelevant
provides a very brief overview of some of the main points. References are given to my papers, where those points are explained in more detail, and citations are provided to the ext...
Andrew M. Odlyzko
118
Voted
CODES
2006
IEEE
15 years 8 months ago
Bounded arbitration algorithm for QoS-supported on-chip communication
Time-critical multi-processor systems require guaranteed services in terms of throughput, bandwidth etc. in order to comply to hard real-time constraints. However, guaranteedservi...
Mohammad Abdullah Al Faruque, Gereon Weiss, Jö...
115
Voted
ISSRE
2005
IEEE
15 years 8 months ago
Automated Checking for Windows Host Vulnerabilities
Evaluation of computing system security requires knowledge of the vulnerabilities present in the system and of potential attacks against the system. Vulnerabilities can be classif...
Matin Tamizi, Matt Weinstein, Michel Cukier
134
Voted
STORAGESS
2005
ACM
15 years 8 months ago
The evolution of storage service providers: techniques and challenges to outsourcing storage
As enterprise storage needs grow, it is challenging to manage storage systems. The costs of locally managing, supporting, and maintaining resilience in storage systems has skyrock...
Ragib Hasan, William Yurcik, Suvda Myagmar
105
Voted
RIDE
2003
IEEE
15 years 8 months ago
ABHIDHA: An extended WordNet for Indo-Aryan Languages
– A lexical knowledge base is an important component of any intelligent information processing system. The WordNet developed at the Cognitive Systems Laboratories at Princeton ha...
Shireesh Reddy Annam, Monojit Choudhury, Sudeshna ...