Sciweavers

628 search results - page 6 / 126
» The numerical evaluation of a challenging integral
Sort
View
VLSID
2008
IEEE
128views VLSI» more  VLSID 2008»
14 years 8 months ago
Addressing the Challenges of Synchronization/Communication and Debugging Support in Hardware/Software Cosimulation
With increasing adoption of Electronic System Level (ESL) tools, effective design and validation time has reduced to a considerable extent. Cosimulation is found to be a principal...
Banit Agrawal, Timothy Sherwood, Chulho Shin, Simo...
LREC
2008
144views Education» more  LREC 2008»
13 years 9 months ago
Linguistic Resources and Evaluation Techniques for Evaluation of Cross-Document Automatic Content Extraction
The NIST Automatic Content Extraction (ACE) Evaluation expands its focus in 2008 to encompass the challenge of cross-document and cross-language global integration and reconciliat...
Stephanie Strassel, Mark A. Przybocki, Kay Peterso...
PAKDD
2010
ACM
158views Data Mining» more  PAKDD 2010»
14 years 19 days ago
Integrative Parameter-Free Clustering of Data with Mixed Type Attributes
Abstract. Integrative mining of heterogeneous data is one of the major challenges for data mining in the next decade. We address the problem of integrative clustering of data with ...
Christian Böhm, Sebastian Goebl, Annahita Osw...
TELSYS
2008
99views more  TELSYS 2008»
13 years 7 months ago
Mote-based underwater sensor networks: opportunities, challenges, and guidelines
Most underwater networks rely on expensive specialized hardware for acoustic communication and modulation. This has impeded wide scale deployments of underwater sensor networks and...
Raja Jurdak, Antonio G. Ruzzelli, Gregory M. P. O'...
ACSAC
2005
IEEE
14 years 1 months ago
User-Centered Security: Stepping Up to the Grand Challenge
User-centered security has been identified as a grand challenge in information security and assurance. It is on the brink of becoming an established subdomain of both security and...
Mary Ellen Zurko