Sciweavers

8503 search results - page 1565 / 1701
» Secure Software Architectures
Sort
View
CONTEXT
2001
Springer
14 years 1 months ago
A Connectionist-Symbolic Approach to Modeling Agent Behavior: Neural Networks Grouped by Contexts
A recent report by the National Research Council (NRC) declares neural networks “hold the most promise for providing powerful learning models”. While some researchers have expe...
Amy E. Henninger, Avelino J. Gonzalez, Michael Geo...
EUROPAR
2001
Springer
14 years 1 months ago
VIA Communication Performance on a Gigabit Ethernet Cluster
As the technology for high-speed networks has evolved over the last decade, the interconnection of commodity computers (e.g., PCs and workstations) at gigabit rates has become a re...
Mark Baker, Paul A. Farrell, Hong Ong, Stephen L. ...
MIDDLEWARE
2001
Springer
14 years 1 months ago
An Efficient Component Model for the Construction of Adaptive Middleware
Middleware has emerged as an important architectural component in modern distributed systems. Most recently, industry has witnessed the emergence of component-based middleware pla...
Michael Clarke, Gordon S. Blair, Geoff Coulson, Ni...
NLDB
2001
Springer
14 years 1 months ago
"Where Are the Christmas Decorations?": A Memory Assistant for Storage Locations
At Hewlett-Packard Laboratories we want to know how inexpensive it can be to endow mobile personal assistants with the ability to speak naturally with their users. To this end, we ...
Lewis G. Creary, Michael VanHilst
SEMWEB
2001
Springer
14 years 1 months ago
Accessing Information and Services on the DAML-Enabled Web
Querying the Web today can be a frustrating activity because the results delivered by syntactically oriented search engines often do not match the intentions of the user. The DARP...
Grit Denker, Jerry R. Hobbs, David L. Martin, Srin...
« Prev « First page 1565 / 1701 Last » Next »