Sciweavers

2500 search results - page 500 / 500
» Specifying Behavior in C
Sort
View
DAC
2012
ACM
11 years 7 months ago
WCET-centric partial instruction cache locking
Caches play an important role in embedded systems by bridging the performance gap between high speed processors and slow memory. At the same time, caches introduce imprecision in ...
Huping Ding, Yun Liang, Tulika Mitra
HPDC
2012
IEEE
11 years 7 months ago
Dynamic adaptive virtual core mapping to improve power, energy, and performance in multi-socket multicores
Consider a multithreaded parallel application running inside a multicore virtual machine context that is itself hosted on a multi-socket multicore physical machine. How should the...
Chang Bae, Lei Xia, Peter A. Dinda, John R. Lange
IMC
2006
ACM
13 years 11 months ago
Malware prevalence in the KaZaA file-sharing network
In recent years, more than 200 viruses have been reported to use a peer-to-peer (P2P) file-sharing network as a propagation vector. Disguised as files that are frequently exchan...
Seungwon Shin, Jaeyeon Jung, Hari Balakrishnan
GECCO
2003
Springer
114views Optimization» more  GECCO 2003»
13 years 10 months ago
Fractional Order Dynamical Phenomena in a GA
This work addresses the fractional-order dynamics during the evolution of a GA, which generates a robot manipulator trajectory. In order to investigate the phenomena involved in th...
Eduardo José Solteiro Pires, José An...
AAAI
2004
13 years 6 months ago
Intelligent Systems Demonstration: The Secure Wireless Agent Testbed (SWAT)
We will demonstrate the Secure Wireless Agent Testbed (SWAT), a unique facility developed at Drexel University to study integration, networking and information assurance for next-...
Gustave Anderson, Andrew Burnheimer, Vincent A. Ci...