Sciweavers

283 search results - page 36 / 57
» Questions and Answers for Designing Useful WebLabs
Sort
View
ACSAC
2005
IEEE
14 years 2 months ago
Graphical Passwords: A Survey
The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, users tend ...
Xiaoyuan Suo, Ying Zhu, G. Scott Owen
FLAIRS
2008
13 years 11 months ago
A Semantic Method for Textual Entailment
The problem of recognizing textual entailment (RTE) has been recently addressed using syntactic and lexical models with some success. Here, we further explore this problem, this t...
Andrew Neel, Max H. Garzon, Vasile Rus
TGIS
2010
107views more  TGIS 2010»
13 years 7 months ago
Spatial Planning on the Semantic Web
Land use regulations are an important but often underrated legal domain. In densely populated regions such as the Netherlands, spatial plans have a profound impact on both (local) ...
Rinke Hoekstra, Radboud Winkels, Erik Hupkes
DATE
2007
IEEE
146views Hardware» more  DATE 2007»
14 years 3 months ago
DFM/DFY: should you trust the surgeon or the family doctor?
Everybody agrees that curing DFM/DFY issues is of paramount importance at 65 nanometers and beyond. Unfortunately, there is disagreement about how and when to cure them. “Surgeo...
Marco Casale-Rossi, Andrzej J. Strojwas, Robert C....
HPCA
2008
IEEE
14 years 9 months ago
Amdahl's Law in the multicore era
We apply Amdahl's Law to multicore chips using symmetric cores, asymmetric cores, and dynamic techniques that allows cores to work together on sequential execution. To Amdahl...
Mark D. Hill