Sciweavers

28 search results - page 4 / 6
» Putting Faulty Cores to Work
Sort
View
BPM
2005
Springer
228views Business» more  BPM 2005»
14 years 3 months ago
Risk Management in the BPM Lifecycle
Business Process Management is considered an essential strategy to create and maintain competitive advantage by streamlining and monitoring corporate processes. While the identific...
Michael zur Muehlen, Danny Ting-Yi Ho
ICRE
2000
IEEE
14 years 2 months ago
Requirements Documentation: Why a Formal Basis is Essential
Unless you have a complete and precise description of your product’s requirements, it is very unlikely that you will satisfy those requirements. A requirements document that is ...
David Lorge Parnas
LREC
2010
140views Education» more  LREC 2010»
13 years 11 months ago
Annotating Event Anaphora: A Case Study
In recent years we have resgitered a renewed interest in event detection and temporal processing of text/discourse. TimeML (Pustejovsky et al., 2003a) has shed new lights on the n...
Tommaso Caselli, Irina Prodanof
DSD
2009
IEEE
136views Hardware» more  DSD 2009»
14 years 1 months ago
An Evaluation of Behaviors of S-NUCA CMPs Running Scientific Workload
Modern systems are able to put two or more processors on the same die (Chip Multiprocessors, CMP), each with its private caches, while the last level caches can be either private ...
Pierfrancesco Foglia, Francesco Panicucci, Cosimo ...
HICSS
2006
IEEE
140views Biometrics» more  HICSS 2006»
14 years 4 months ago
Programming Education in the Era of the Internet: A Paradigm Shift
Over the last several years, the Computer Science (CS) community has put a great deal of effort in to the area of security research, and have made great advances. Counterintuitive...
Scott Harrison, Nadine Hanebutte, Jim Alves-Foss