Sciweavers

8503 search results - page 1505 / 1701
» Secure Software Architectures
Sort
View
DAC
2006
ACM
14 years 11 months ago
HybDTM: a coordinated hardware-software approach for dynamic thermal management
With ever-increasing power density and cooling costs in modern high-performance systems, dynamic thermal management (DTM) has emerged as an effective technique for guaranteeing th...
Amit Kumar 0002, Li Shang, Li-Shiuan Peh, Niraj K....
MICCAI
2003
Springer
14 years 11 months ago
Analysis Tool for Diffusion Tensor MRI
Abstract. Diffusion Tensor Imaging (DTI) is becoming a routine magnetic resonance technique to study white matter properties and alterations of fiber integrity due to pathology. Th...
Pierre Fillard, Guido Gerig
SIGSOFT
2007
ACM
14 years 11 months ago
Model checking service compositions under resource constraints
When enacting a web service orchestration defined using the Business Process Execution Language (BPEL) we observed various safety property violations. This surprised us considerab...
David S. Rosenblum, Howard Foster, Jeff Kramer, Je...
WWW
2002
ACM
14 years 11 months ago
Probabilistic question answering on the web
Web-based search engines such as Google and NorthernLight return documents that are relevant to a user query, not answers to user questions. We have developed an architecture that...
Dragomir R. Radev, Weiguo Fan, Hong Qi, Harris Wu,...
KDD
2009
ACM
169views Data Mining» more  KDD 2009»
14 years 10 months ago
COA: finding novel patents through text analysis
In recent years, the number of patents filed by the business enterprises in the technology industry are growing rapidly, thus providing unprecedented opportunities for knowledge d...
Mohammad Al Hasan, W. Scott Spangler, Thomas D. Gr...
« Prev « First page 1505 / 1701 Last » Next »