Sciweavers

6829 search results - page 1330 / 1366
» Quantitative Generalizations of Languages
Sort
View
CODES
2004
IEEE
14 years 12 days ago
Operation tables for scheduling in the presence of incomplete bypassing
Register bypassing is a powerful and widely used feature in modern processors to eliminate certain data hazards. Although complete bypassing is ideal for performance, bypassing ha...
Aviral Shrivastava, Eugene Earlie, Nikil D. Dutt, ...
CCS
2006
ACM
14 years 11 days ago
Beyond separation of duty: an algebra for specifying high-level security policies
A high-level security policy states an overall requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires a sensi...
Ninghui Li, Qihua Wang
CIKM
2006
Springer
14 years 11 days ago
Summarizing local context to personalize global web search
The PC Desktop is a very rich repository of personal information, efficiently capturing user's interests. In this paper we propose a new approach towards an automatic persona...
Paul-Alexandru Chirita, Claudiu S. Firan, Wolfgang...
CLEF
2006
Springer
14 years 11 days ago
CLEF-2006 CL-SR at Maryland: English and Czech
The University of Maryland participated in the English and Czech tasks. For English, one monolingual run using only fields based on fully automatic transcription (the required con...
Jianqiang Wang, Douglas W. Oard
CLEF
2006
Springer
14 years 11 days ago
University of Alicante at WiQA 2006
This paper presents the participation of University of Alicante at the WiQA pilot task organized as part of the CLEF 2006 campaign. For a given set of topics, this task presuppose...
Antonio Toral Ruiz, Georgiana Puscasu, Lorenza Mor...
« Prev « First page 1330 / 1366 Last » Next »