Virtual enterprises have great difficulty in defining and adapting their business processes across the members of the virtual enterprise. We introduce an approach that allows (semi...
Christian Rupprecht, Thomas Rose, E. van Halm, Ari...
This paper presents a state assignment technique called priority encoding which uses multi-code assignment plus clock gating to reduce power dissipation in sequential circuits. Th...
Higman's lemma has a very elegant, non-constructive proof due to Nash-Williams [NW63] using the so-called minimal-bad-sequence argument. The objective of the present paper is ...
This paper proposes a method for extracting bilingual text pairs from a comparable corpus. The basic idea of the method is to apply bootstrapping to an existing corpusbased cross-...
Hiroshi Masuichi, Raymond Flournoy, Stefan Kaufman...
Currently, there is no commonly accepted methodology for developing organizational memory systems (OM) that is comprehensive in the sense that it guides the development process fr...