Sciweavers

757 search results - page 89 / 152
» Composing Security-Aware Software
Sort
View
PERCOM
2010
ACM
15 years 1 months ago
Incremental awareness and compositionality: A design philosophy for context-aware pervasive systems
Context-aware pervasive systems are an important emerging category of software, increasingly pervading into daily life, play and work. These systems are characterized by capabilit...
Seng Wai Loke
ENTCS
2010
88views more  ENTCS 2010»
15 years 19 days ago
Range and Set Abstraction using SAT
d Set Abstraction using SAT Edd Barrett Andy King School of Computing, University of Kent, CT2 7NF, UK Symbolic decision trees are not the only way to correlate the relationship b...
Edd Barrett, Andy King
JCC
2011
154views more  JCC 2011»
14 years 6 months ago
Can we trust docking results? Evaluation of seven commonly used programs on PDBbind database
: Docking is one of the most commonly used techniques in drug design. It is used for both identifying correct poses of a ligand in the binding site of a protein as well as for the ...
Dariusz Plewczynski, Michal Lazniewski, Rafal Augu...
FPGA
2006
ACM
224views FPGA» more  FPGA 2006»
15 years 7 months ago
Flexible implementation of genetic algorithms on FPGAs
In this paper, we propose a technique to flexibly implement genetic algorithms for various problems on FPGAs. For the purpose, we propose a basic architecture for GA which consist...
Tatsuhiro Tachibana, Yoshihiro Murata, Naoki Shiba...
ISCA
2012
IEEE
208views Hardware» more  ISCA 2012»
13 years 5 months ago
Harmony: Collection and analysis of parallel block vectors
Efficient execution of well-parallelized applications is central to performance in the multicore era. Program analysis tools support the hardware and software sides of this effor...
Melanie Kambadur, Kui Tang, Martha A. Kim