Sciweavers

3920 search results - page 675 / 784
» Challenges in Software Evolution
Sort
View
CLEF
2008
Springer
15 years 5 months ago
Overview of the ImageCLEFphoto 2008 Photographic Retrieval Task
ImageCLEFphoto 2008 is an ad-hoc photo retrieval task and part of the ImageCLEF evaluation campaign. This task provides both the resources and the framework necessary to perform c...
Thomas Arni, Paul Clough, Mark Sanderson, Michael ...
EIT
2008
IEEE
15 years 5 months ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno
ETFA
2008
IEEE
15 years 5 months ago
Hardware acceleration for verifiable, adaptive real-time communication
Distributed real-time applications implement distributed applications with timeliness requirements. Such systems require a deterministic communication medium with bounded communic...
Sebastian Fischmeister, Insup Lee, Robert Trausmut...
FMICS
2008
Springer
15 years 5 months ago
Dynamic Event-Based Runtime Monitoring of Real-Time and Contextual Properties
Given the intractability of exhaustively verifying software, the use of runtime-verification, to verify single execution paths at runtime, is becoming popular. Although the use of ...
Christian Colombo, Gordon J. Pace, Gerardo Schneid...
CIDR
2007
105views Algorithms» more  CIDR 2007»
15 years 5 months ago
Turning Cluster Management into Data Management; A System Overview
This paper introduces the CondorJ2 cluster management system. Traditionally, cluster management systems such as Condor employ a process-oriented approach with little or no use of ...
Eric Robinson, David J. DeWitt