Sciweavers

1398 search results - page 197 / 280
» The Real World Software Process
Sort
View
AIA
2007
13 years 9 months ago
Minimizing leakage: What if every gate could have its individual threshold voltage?
Designers aim at fast but low-power consuming integrated circuits. Since high processing speed always comes with high energy demands, the literature provides several ways to reduc...
Ralf Salomon, Frank Sill, Dirk Timmermann
COLING
2008
13 years 9 months ago
Verification and Implementation of Language-Based Deception Indicators in Civil and Criminal Narratives
Our goal is to use natural language processing to identify deceptive and nondeceptive passages in transcribed narratives. We begin by motivating an analysis of language-based dece...
Joan Bachenko, Eileen Fitzpatrick, Michael Schonwe...
SDM
2010
SIAM
200views Data Mining» more  SDM 2010»
13 years 9 months ago
Residual Bayesian Co-clustering for Matrix Approximation
In recent years, matrix approximation for missing value prediction has emerged as an important problem in a variety of domains such as recommendation systems, e-commerce and onlin...
Hanhuai Shan, Arindam Banerjee
EON
2008
13 years 9 months ago
Semantic Web Service Discovery and Selection: a Test Bed Scenario
Abstract. The Semantic Web Service Challenge is one of the major initiative dedicated to work on Semantic Web Service (SWS) discovery and selection. It represents an effective mann...
Alessio Carenini, Dario Cerizza, Marco Comerio, Em...
MEDINFO
2007
129views Healthcare» more  MEDINFO 2007»
13 years 9 months ago
Confidentiality Preserving Audits of Electronic Medical Record Access
Failure to supply a care provider with timely access to a patient's medical record can lead to patient harm or death. As such, healthcare organizations often endow care provi...
Bradley Malin, Edoardo Airoldi