Sciweavers

5544 search results - page 1000 / 1109
» Three Inadequate Models
Sort
View
WSC
2001
13 years 11 months ago
Choosing among seven bases
In this paper, the selection of a BASE Case was every bit as important as the simulation itself. The production team had been familiar with simulations and had used their results ...
Stuart Gittlitz
WSC
2004
13 years 11 months ago
Speech Acts of War
This research investigates Speech Acts performed in the war film Platoon. It aims at finding details about the types of speech acts, their form and how they are expressed by the i...
John David Salt
ANLP
1997
137views more  ANLP 1997»
13 years 11 months ago
Probabilistic and Rule-Based Tagger of an Inflective Language- a Comparison
We present results of probabilistic tagging of Czech texts in order to show how these techniques work for one of the highly morphologically ambiguous inflective languages. After d...
Jan Hajic, Barbora Hladká
COOTS
1997
13 years 11 months ago
MiSFIT: A Tool for Constructing Safe Extensible C++ Systems
The boundary between application and system is becoming increasingly permeable. Extensible applications, such as web browsers, database systems, and operating systems, demonstrate...
Christopher Small
WSC
2000
13 years 11 months ago
A comparison of five steady-state truncation heuristics for simulation
We compare the performance of five well-known truncation heuristics for mitigating the effects of initialization bias in the output analysis of steady-state simulations. Two of th...
K. Preston White, Michael J. Cobb, Stephen C. Spra...
« Prev « First page 1000 / 1109 Last » Next »