Sciweavers

1219 search results - page 62 / 244
» Where to Look Next
Sort
View
ISJGP
2007
89views more  ISJGP 2007»
13 years 9 months ago
Trends in Security Product Evaluations
Government-endorsed security evaluations, like those performed under the Common Criteria (CC), use established techniques of software quality assurance to try to evaluate product ...
Richard E. Smith
JSW
2007
126views more  JSW 2007»
13 years 9 months ago
Efficient Evaluation of Multiple-Output Boolean Functions in Embedded Software or Firmware
— The paper addresses software and firmware implementation of multiple-output Boolean functions based on cascades of Look-Up Tables (LUTs). A LUT cascade is described as a means ...
Vaclav Dvorak
CORR
2002
Springer
118views Education» more  CORR 2002»
13 years 9 months ago
Unsupervised discovery of morphologically related words based on orthographic and semantic similarity
We present an algorithm that takes an unannotated corpus as its input, and returns a ranked list of probable morphologically related pairs as its output. The algorithm tries to di...
Marco Baroni, Johannes Matiasek, Harald Trost
SAJ
2000
80views more  SAJ 2000»
13 years 9 months ago
Handling diversity in group Work in the information systems class
Tertiary institutions in South Africa are faced with dealing with diversity in all its forms in our classrooms. Information Systems, Information Technology and Computer Science st...
T. Thomas, C. De Villiers
ELECTRONICMARKETS
1998
85views more  ELECTRONICMARKETS 1998»
13 years 9 months ago
Electronic Markets in Hong Kong's Air Cargo Community
AbstractAbstractAbstractAbstract This paper takes a critical look at electronic markets. Through an examination of Hong Kong’s air cargo industry, where an electronic network rec...
Jan Damsgaard