Sciweavers

813 search results - page 91 / 163
» Pipeline-centric provenance model
Sort
View
TSE
2008
97views more  TSE 2008»
13 years 9 months ago
Timed Automata Patterns
Timed Automata have proven to be useful for specification and verification of real-time systems. System design using Timed Automata relies on explicit manipulation of clock variabl...
Jin Song Dong, Ping Hao, Shengchao Qin, Jun Sun 00...
JUCS
2008
116views more  JUCS 2008»
13 years 8 months ago
Parallel Key Exchange
: In the paper we study parallel key exchange among multiple parties. The status of parallel key exchange can be depicted by a key graph. In a key graph, a vertex represents a part...
Ik Rae Jeong, Dong Hoon Lee
JCP
2008
114views more  JCP 2008»
13 years 7 months ago
A Novel Feature Selection Algorithm Based on Hypothesis-Margin
Iterative search margin based algorithm(Simba) has been proven effective for feature selection. However, it still has the following disadvantages: (1) the previously proposed model...
Ming Yang, Fei Wang, Ping Yang
MT
2010
100views more  MT 2010»
13 years 7 months ago
Exploiting syntactic relationships in a phrase-based decoder: an exploration
Phrase-based decoding is conceptually simple and straightforward to implement, at the cost of drastically oversimplified reordering models. Syntactically aware models make it pos...
Tim Hunter, Philip Resnik
TWC
2010
13 years 3 months ago
Link Energy Minimization in IR-UWB Based Wireless Networks
Abstract--Impulse Radio Ultra WideBand (IR-UWB) communication has proven to be an important technique for supporting high-rate, short-range, and low-power communication. In this pa...
Tianqi Wang, Wendi B. Heinzelman, Alireza Seyedi