Sciweavers

1169 search results - page 139 / 234
» Degrees of monotone complexity
Sort
View
116
Voted
ICST
2010
IEEE
14 years 11 months ago
Searching for a Needle in a Haystack: Predicting Security Vulnerabilities for Windows Vista
—Many factors are believed to increase the vulnerability of software system; for example, the more widely deployed or popular is a software system the more likely it is to be att...
Thomas Zimmermann, Nachiappan Nagappan, Laurie A. ...
107
Voted
ICRA
2009
IEEE
170views Robotics» more  ICRA 2009»
14 years 10 months ago
Mixed reality simulation for mobile robots
Mobile robots are increasingly entering the real and complex world of humans in ways that necessitate a high degree of interaction and cooperation between human and robot. Complex ...
Ian Yen-Hung Chen, Bruce A. MacDonald, Burkhard W&...
102
Voted
ICASSP
2011
IEEE
14 years 4 months ago
Are all basis updates for lattice-reduction-aided MIMO detection necessary?
The question in the title is relevant when considering latticereduction-aided MIMO detectors, which achieve the same diversity as the maximum-likelihood detector while exhibiting ...
Brian Gestner, Xiaoli Ma, David V. Anderson
119
Voted
ICS
2004
Tsinghua U.
15 years 6 months ago
CQoS: a framework for enabling QoS in shared caches of CMP platforms
Cache hierarchies have been traditionally designed for usage by a single application, thread or core. As multi-threaded (MT) and multi-core (CMP) platform architectures emerge and...
Ravi R. Iyer
LCPC
2009
Springer
15 years 5 months ago
Using the Meeting Graph Framework to Minimise Kernel Loop Unrolling for Scheduled Loops
This paper improves our previous research effort [1] by providing an efficient method for kernel loop unrolling minimisation in the case of already scheduled loops, where circular...
Mounira Bachir, David Gregg, Sid Ahmed Ali Touati