Sciweavers

293 search results - page 51 / 59
» Value-at-Risk in IT Services Contracts
Sort
View
NAACL
2003
13 years 9 months ago
Automatic Acquisition of Names Using Speak and Spell Mode in Spoken Dialogue Systems
This paper describes a novel multi-stage recognition procedure for deducing the spelling and pronunciation of an open set of names. The overall goal is the automatic acquisition o...
Grace Chung, Stephanie Seneff, Chao Wang
AAAI
1994
13 years 9 months ago
Exploiting Meta-Level information in a Distributed Scheduling System
In this paper, we study the problem of achieving efficient interaction in a distributed scheduling system whose scheduling agents may borrow resources from one another. Specifical...
Daniel E. Neiman, David W. Hildum, Victor R. Lesse...
SIGUCCS
2000
ACM
14 years 2 days ago
There is No Such Thing as Free Support
Every campus department needs computer support, from ordering and setting up new computers to installing software and answering software questions. This is in addition to training...
Dianne Brotherson
INTERNET
2002
145views more  INTERNET 2002»
13 years 7 months ago
Where is Middleware?
stract level, remote procedure calls enable programmers to invoke (possibly remote) services as if they were intra-application procedure calls. Much like function or procedure call...
Steve Vinoski
JBCS
2010
152views more  JBCS 2010»
13 years 6 months ago
Evolution support in heterogeneous service-oriented landscapes
We present an incarnation of the Enterprise Physics vision sketched in [3] that provides automatic or semi-automatic support for evolution and change management in heterogeneous le...
Tiziana Margaria, Bernhard Steffen, Christian Kubc...