نتایج جستجو برای: and methodology

تعداد نتایج: 16844190  

2017
Lina Barakat Phillip Taylor Nathan Griffiths Simon Miles

In today’s distributed and heterogeneous systems, provenance data is becoming increasingly important for understanding process flow, tracing how outputs came about, and enabling users to make more informed decisions based on such outputs. However, within such systems, the sources (computational or human) that generate provenance may belong to different stakeholders operating under different pol...

2008
Kay Römer

Today it is possible to deploy sensor networks in the real world and collect large amounts of raw sensory data. However, it remains a major challenge to make sense of sensor data, i.e., to extract high-level knowledge from the raw data. In this paper we present a novel in-network knowledge discovery technique, where high-level information is inferred from raw sensor data directly on the sensor ...

2007
Gad Frenkel Raphael Blumenfeld Peter R. King Martin J. Blunt

[*] Dr. G. Frenkel, Dr. R. Blumenfeld, Prof. P. R. King, Prof. M. J. Blunt Earth Science and Engineering, Imperial College London SW7 2AZ, UK E-mail: [email protected]; [email protected] Dr. R. Blumenfeld Biological and Soft Systems, Cavendish Laboratory Cambridge CB3 0HE, UK [**] Acknowledgment: We thank Dr. Stephen J. Neethling for his help with foam generation by the surface evolver....

2006
Tomaso Duso Klaus Gugler Burcin Yurtoglu

Mergers that substantially lessen competition are challenged by antitrust authorities. Instead of blocking anticompetitive transitions straight away, authorities might choose to negotiate with the merging parties and allow the transactions to proceed with modifications that restore or preserve the competition in the involved markets. We study a sample of 167 mergers that were under the European...

2012
Ruihong Huang Ellen Riloff

Event extraction systems typically locate the role fillers for an event by analyzing sentences in isolation and identifying each role filler independently of the others. We argue that more accurate event extraction requires a view of the larger context to decide whether an entity is related to a relevant event. We propose a bottom-up approach to event extraction that initially identifies candid...

2009
Petr MÁCA Paul TORFS

The rainfall input is one of the main factors influencing the magnitude of the runoff response during a flood event. Its temporal and spatial distribution significantly contributes to the formation of hydrograph shape, peak discharge and flood volume. a novel approach to the evaluation of the role of the temporal rainfall pattern of hydrograph is presented in this contribution. The methodology ...

2010
B. O. Akinkunmi

Reified logics have been a major subject of interest in the knowledge representation community for well over twenty years, since over the years, the need to quantify and reason about propositional entities such as events and states among other temporal entities has grown. Galton had made it clear that one may either refer to types or tokens (instances) of such entities in the ontology. A clear ...

2014
Pawel Foremski Michal Gorawski Krzysztof Grochla

We propose a generator that represents traffic transmitted in mobile wireless networks. It is based on measurements of IP flows in a real, large-scale LTE network. The proposed tool generates TCP flow sizes and durations. We verify the generator by comparison with the traces available in the literature, and we propose application in discrete event simulators.

2009
Kristinn R. Thórisson Rögnvaldur J. Saemundsson Gudny Ragna Jonsdottir Brynjar Reynisson Claudio Pedica Palli Runar Thrainsson Palmi Skowronski

Among the benefits of agent-based modeling is parallel development and implementation of components. Integrating large numbers of agents developed by many is, however, a significant challenge. Further, architectural changes can require significant redesign. We have developed CDM-S, the Constructionist Design Methodology for Simulation, an agent-oriented methodology for developing, implementing ...

2012
Marcio F. S. Oliveira Christoph Kuznik Wolfgang Mueller Wolfgang Ecker Volkan Esen

This paper introduces the System Verification Methodology (SVM) Library as an advanced TLM library for SystemC, which is based on the OVM-SC library, a SystemC implementation of an Open Verification Methodology (OVM) subset. SVM integrates with a functional coverage library and comes as a significant extension of the OVM-SC library, by providing domain specific components (drivers, monitors, sc...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید