Sciweavers

2169 search results - page 359 / 434
» Using Risk Analysis to Evaluate Design Alternatives
Sort
View
TASLP
2002
143views more  TASLP 2002»
15 years 4 months ago
Creating conversational interfaces for children
Creating conversational interfaces for children is challenging in several respects. These include acoustic modeling for automatic speech recognition (ASR), language and dialog mode...
Shrikanth S. Narayanan, Alexandros Potamianos
CF
2009
ACM
15 years 11 months ago
Core monitors: monitoring performance in multicore processors
As we reach the limits of single-core computing, we are promised more and more cores in our systems. Modern architectures include many performance counters per core, but few or no...
Paul E. West, Yuval Peress, Gary S. Tyson, Sally A...
LCTRTS
2004
Springer
15 years 9 months ago
Feedback driven instruction-set extension
Application specific instruction-set processors combine an efficient general purpose core with special purpose functionality that is tailored to a particular application domain. ...
Uwe Kastens, Dinh Khoi Le, Adrian Slowik, Michael ...
CN
2007
133views more  CN 2007»
15 years 4 months ago
Automatic high-performance reconstruction and recovery
Self-protecting systems require the ability to instantaneously detect malicious activity at run-time and prevent execution. We argue that it is impossible to perfectly self-protec...
Ashvin Goel, Wu-chang Feng, Wu-chi Feng, David Mai...
SAC
2004
ACM
15 years 10 months ago
Information requirements engineering for data warehouse systems
Information requirements analysis for data warehouse systems differs significantly from requirements analysis for conventional information systems. Based on interviews with projec...
Robert Winter, Bernhard Strauch