Sciweavers

5634 search results - page 1068 / 1127
» About Abstract Classes
Sort
View
ICCAD
2001
IEEE
201views Hardware» more  ICCAD 2001»
15 years 8 months ago
An Integrated Data Path Optimization for Low Power Based on Network Flow Method
Abstract: We propose an effective algorithm for power optimization in behavioral synthesis. In previous work, it has been shown that several hardware allocation/binding problems fo...
Chun-Gi Lyuh, Taewhan Kim, Chien-Liang Liu
PEPM
2010
ACM
15 years 8 months ago
Context-sensitive analysis of obfuscated x86 executables
A method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations is presented. Such binaries may use operators to directly manipul...
Arun Lakhotia, Davidson R. Boccardo, Anshuman Sing...
HICSS
2010
IEEE
161views Biometrics» more  HICSS 2010»
15 years 6 months ago
Managing Information Intensive Service Facilities: Executive Contracts, Market Information, and Capacity Planning
in Progress – Extended Abstract Word count: 3124 Effectively managing IT service centers such as call centers, computerized diagnostic imaging facilities, data centers, e-commerc...
Yabing Jiang, Abraham Seidmann
ICDE
2010
IEEE
399views Database» more  ICDE 2010»
15 years 6 months ago
Discovery-driven graph summarization
Abstract— Large graph datasets are ubiquitous in many domains, including social networking and biology. Graph summarization techniques are crucial in such domains as they can ass...
Ning Zhang, Yuanyuan Tian, Jignesh M. Patel
LCTRTS
2010
Springer
15 years 6 months ago
Contracts for modular discrete controller synthesis
We describe the extension of a reactive programming language with a behavioral contract construct. It is dedicated to the programming of reactive control of applications in embedd...
Gwenaël Delaval, Hervé Marchand, &Eacu...
« Prev « First page 1068 / 1127 Last » Next »