Sciweavers

367 search results - page 14 / 74
» Using the Experimental Method to Produce Reliable Self-Organ...
Sort
View
CASES
2005
ACM
13 years 9 months ago
Segment protection for embedded systems using run-time checks
The lack of virtual memory protection is a serious source of unreliability in many embedded systems. Without the segment-level protection it provides, these systems are subject to...
Matthew Simpson, Bhuvan Middha, Rajeev Barua
CASES
2007
ACM
13 years 11 months ago
Rethinking custom ISE identification: a new processor-agnostic method
The last decade has witnessed the emergence of the Application Specific Instruction-set Processor (ASIP) as a viable platform for embedded systems. Extensible ASIPs allow the user...
Ajay K. Verma, Philip Brisk, Paolo Ienne
SIGCSE
2002
ACM
218views Education» more  SIGCSE 2002»
13 years 7 months ago
Participatory design in a human-computer interaction course: teaching ethnography methods to computer scientists
Empirical evidence shows the ability for computer technology to deliver on its promises of enhancing our quality of life relies on how well the application fits our understanding ...
Jerry B. Weinberg, Mary L. Stephen
CIKM
2008
Springer
13 years 9 months ago
Kernel methods, syntax and semantics for relational text categorization
Previous work on Natural Language Processing for Information Retrieval has shown the inadequateness of semantic and syntactic structures for both document retrieval and categoriza...
Alessandro Moschitti
CORR
2010
Springer
145views Education» more  CORR 2010»
13 years 4 months ago
Dynamic Capitalization and Visualization Strategy in Collaborative Knowledge Management System for EI Process
Abstract--Knowledge is attributed to human whose problemsolving behavior is subjective and complex. In today's knowledge economy, the need to manage knowledge produced by a co...
Bolanle Oladejo, Victor Odumuyiwa, Amos David