Sciweavers

7741 search results - page 1531 / 1549
» Security in Active Networks
Sort
View
MAM
2007
99views more  MAM 2007»
13 years 10 months ago
Laboratory-based calibration of available bandwidth estimation tools
Examining the validity or accuracy of proposed available bandwidth estimation tools remains a challenging problem. A common approach consists of evaluating a newly developed tool ...
Joel Sommers, Paul Barford, Walter Willinger
COLING
2002
13 years 10 months ago
Data-driven Classification of Linguistic Styles in Spoken Dialogues
Language users have individual linguistic styles. A spoken dialogue system may benefit from adapting to the linguistic style of a user in input analysis and output generation. To ...
Thomas Portele
DEBU
2000
147views more  DEBU 2000»
13 years 10 months ago
XJoin: A Reactively-Scheduled Pipelined Join Operator
Wide-area distribution raises significant performance problems for traditional query processing techniques as data access becomes less predictable due to link congestion, load imb...
Tolga Urhan, Michael J. Franklin
TOMACS
1998
140views more  TOMACS 1998»
13 years 9 months ago
Technical Note: A Hierarchical Computer Architecture Design and Simulation Environment
architectures at multiple levels of abstraction, encompassing both hardware and software. It has five modes of operation (Design, Model Validation, Build Simulation, Simulate Syste...
Paul S. Coe, Fred W. Howell, Roland N. Ibbett, Lau...
SOSYM
2002
188views more  SOSYM 2002»
13 years 9 months ago
Extending the Unified Modeling Language for ontology development
Abstract. There is rapidly growing momentum for web enabled agents that reason about and dynamically integrate the appropriate knowledge and services at run-time. The dynamic integ...
Kenneth Baclawski, Mieczyslaw M. Kokar, Paul A. Ko...
« Prev « First page 1531 / 1549 Last » Next »