Sciweavers

2236 search results - page 405 / 448
» Secure Software Design in Practice
Sort
View
CIKM
2010
Springer
13 years 9 months ago
Components for information extraction: ontology-based information extractors and generic platforms
Information Extraction (IE) has existed as a field for several decades and has produced some impressive systems in the recent past. Despite its success, widespread usage and comm...
Daya C. Wimalasuriya, Dejing Dou
STTT
2010
97views more  STTT 2010»
13 years 9 months ago
Distributed dynamic partial order reduction
Abstract. Runtime (dynamic) model checking is a promising verification methodology for real-world threaded software because of its many features, the prominent ones being: (i) it ...
Yu Yang, Xiaofang Chen, Ganesh Gopalakrishnan, Rob...
SAMOS
2010
Springer
13 years 8 months ago
CLI-based compilation flows for the C language
Abstract--Embedded systems contain a wide variety of processors. Economical and technological factors favor systems made of a combination of diverse but programmable processors. So...
Erven Rohou, Andrea C. Ornstein, Marco Cornero
ICPPW
2009
IEEE
13 years 8 months ago
Analyzing Checkpointing Trends for Applications on the IBM Blue Gene/P System
Current petascale systems have tens of thousands of hardware components and complex system software stacks, which increase the probability of faults occurring during the lifetime ...
Harish Gapanati Naik, Rinku Gupta, Pete Beckman
SIGIR
2010
ACM
13 years 5 months ago
PRES: a score metric for evaluating recall-oriented information retrieval applications
Information retrieval (IR) evaluation scores are generally designed to measure the effectiveness with which relevant documents are identified and retrieved. Many scores have been ...
Walid Magdy, Gareth J. F. Jones