Sciweavers

8503 search results - page 1505 / 1701
» Secure Software Architectures
Sort
View
136
Voted
DAC
2006
ACM
16 years 3 months ago
HybDTM: a coordinated hardware-software approach for dynamic thermal management
With ever-increasing power density and cooling costs in modern high-performance systems, dynamic thermal management (DTM) has emerged as an effective technique for guaranteeing th...
Amit Kumar 0002, Li Shang, Li-Shiuan Peh, Niraj K....
106
Voted
MICCAI
2003
Springer
16 years 3 months ago
Analysis Tool for Diffusion Tensor MRI
Abstract. Diffusion Tensor Imaging (DTI) is becoming a routine magnetic resonance technique to study white matter properties and alterations of fiber integrity due to pathology. Th...
Pierre Fillard, Guido Gerig
130
Voted
SIGSOFT
2007
ACM
16 years 3 months ago
Model checking service compositions under resource constraints
When enacting a web service orchestration defined using the Business Process Execution Language (BPEL) we observed various safety property violations. This surprised us considerab...
David S. Rosenblum, Howard Foster, Jeff Kramer, Je...
111
Voted
WWW
2002
ACM
16 years 3 months ago
Probabilistic question answering on the web
Web-based search engines such as Google and NorthernLight return documents that are relevant to a user query, not answers to user questions. We have developed an architecture that...
Dragomir R. Radev, Weiguo Fan, Hong Qi, Harris Wu,...
127
Voted
KDD
2009
ACM
169views Data Mining» more  KDD 2009»
16 years 3 months ago
COA: finding novel patents through text analysis
In recent years, the number of patents filed by the business enterprises in the technology industry are growing rapidly, thus providing unprecedented opportunities for knowledge d...
Mohammad Al Hasan, W. Scott Spangler, Thomas D. Gr...
« Prev « First page 1505 / 1701 Last » Next »