Sciweavers

674 search results - page 117 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
HIPC
2007
Springer
14 years 26 days ago
Accomplishing Approximate FCFS Fairness Without Queues
First Come First Served (FCFS) is a policy that is accepted for implementing fairness in a number of application domains such as scheduling in Operating Systems, scheduling web req...
K. Subramani, Kamesh Madduri
LREC
2008
110views Education» more  LREC 2008»
13 years 10 months ago
Automatic Assessment of Japanese Text Readability Based on a Textbook Corpus
This paper describes a method of readability measurement of Japanese texts based on a newly compiled textbook corpus. The textbook corpus consists of 1,478 sample passages extract...
Satoshi Sato, Suguru Matsuyoshi, Yohsuke Kondoh
CORR
2007
Springer
164views Education» more  CORR 2007»
13 years 9 months ago
Consistency of the group Lasso and multiple kernel learning
We consider the least-square regression problem with regularization by a block 1-norm, that is, a sum of Euclidean norms over spaces of dimensions larger than one. This problem, r...
Francis Bach
SLIP
2006
ACM
14 years 2 months ago
Generation of design guarantees for interconnect matching
Manufacturable design requires matching of interconnects which have equal nominal dimensions. New design rules are projected to bring guarantee rules for interconnect matching. In...
Andrew B. Kahng, Rasit Onur Topaloglu
OOPSLA
2004
Springer
14 years 2 months ago
Finding and preventing run-time error handling mistakes
It is difficult to write programs that behave correctly in the presence of run-time errors. Existing programming language features often provide poor support for executing clean-u...
Westley Weimer, George C. Necula