Sciweavers

160 search results - page 12 / 32
» Selecting the best strategy in a software certification proc...
Sort
View
P2P
2006
IEEE
229views Communications» more  P2P 2006»
14 years 1 months ago
Cost-Aware Processing of Similarity Queries in Structured Overlays
Large-scale distributed data management with P2P systems requires the existence of similarity operators for queries as we cannot assume that all users will agree on exactly the sa...
Marcel Karnstedt, Kai-Uwe Sattler, Manfred Hauswir...
HICSS
2009
IEEE
143views Biometrics» more  HICSS 2009»
14 years 2 months ago
Bridge Methods: Using a Balanced Project Practice Portfolio to Integrate Agile and Formal Process Methodologies
This paper examines the non-linear nature of progress on software projects. It asserts that this uneven accomplishment stems from the continuous need to drive value quickly in res...
Stephen J. Cohen, William H. Money
ICDAR
1999
IEEE
13 years 12 months ago
Preattentive Reading and Selective Attention for Document Image Analysis
PixED (from Pixel to Electronic Document) is aimed at converting document images into structured electronic documents which can be read by a machine for information retrieval. The...
Claudie Faure
COLING
2000
13 years 9 months ago
A Client/Server Architecture for Word Sense Disambiguation
This paper presents a robust client/server implementation of a word sense disambiguator for English. This system associates a word with its meaning in a given context using dictio...
Caroline Brun
SAFECOMP
2007
Springer
14 years 1 months ago
Safety Analysis of Safety-Critical Software for Nuclear Digital Protection System
A strategy and relating activities of a software safety analysis (SSA) are presented for the software of a digital reactor protection system where software modules in the design de...
Gee-Yong Park, Jang-Soo Lee, Se Woo Cheon, Kee-Cho...