Sciweavers

2957 search results - page 259 / 592
» Code analysis and CS-XML
Sort
View
ICCAD
2001
IEEE
185views Hardware» more  ICCAD 2001»
16 years 21 days ago
Application-Driven Processor Design Exploration for Power-Performance Trade-off Analysis
1 - This paper presents an efficient design exploration environment for high-end core processors. The heart of the proposed design exploration framework is a two-level simulation e...
Diana Marculescu, Anoop Iyer
138
Voted
P2P
2009
IEEE
137views Communications» more  P2P 2009»
15 years 10 months ago
Analysis of Failure Correlation Impact on Peer-to-Peer Storage Systems
Abstract—Peer-to-peer storage systems aim to provide a reliable long-term storage at low cost. In such systems, peers fail continuously, hence, the necessity of self-repairing me...
Olivier Dalle, Frédéric Giroire, Jul...
IPPS
2009
IEEE
15 years 10 months ago
Predictive analysis and optimisation of pipelined wavefront computations
Pipelined wavefront computations are a ubiquitous class of parallel algorithm used for the solution of a num­ ber of scientific and engineering applications. This paper investig...
Gihan R. Mudalige, Simon D. Hammond, J. A. Smith, ...
PRIB
2009
Springer
147views Bioinformatics» more  PRIB 2009»
15 years 10 months ago
Cross-Platform Analysis with Binarized Gene Expression Data
Abstract. With widespread use of microarray technology as a potential diagnostics tool, the comparison of results obtained from the use of different platforms is of interest. When...
Salih Tuna, Mahesan Niranjan
SERSCISA
2009
Springer
15 years 10 months ago
Counteracting Phishing Page Polymorphism: An Image Layout Analysis Approach
Many visual similarity-based phishing page detectors have been developed to detect phishing webpages, however, scammers now create polymorphic phishing pages to breach the defense ...
Ieng-Fat Lam, Wei-Cheng Xiao, Szu-Chi Wang, Kuan-T...