Sciweavers

14078 search results - page 2696 / 2816
» Design and Analysis of Computer Algorithms
Sort
View
ASM
2010
ASM
15 years 9 months ago
Using Event-B to Verify the Kmelia Components and Their Assemblies
and formal model, named Kmelia [1,2], with an associated language to specify components, their provided and required services and their assemblies; we also developed a framework na...
Pascal André, Gilles Ardourel, Christian At...
CODES
2008
IEEE
15 years 9 months ago
Cache-aware optimization of BAN applications
Body-area sensor network or BAN-based health monitoring is increasingly becoming a popular alternative to traditional wired bio-monitoring techniques. However, most biomonitoring ...
Yun Liang, Lei Ju, Samarjit Chakraborty, Tulika Mi...
IAT
2008
IEEE
15 years 9 months ago
Intent-Driven Insider Threat Detection in Intelligence Analyses
In intelligence analysis, information plays an important role in solving problems and making decisions. However, an increasing number of malicious behaviors, most of which come fr...
Eugene Santos Jr., Hien Nguyen, Fei Yu, Keum Joo K...
IEEEPACT
2007
IEEE
15 years 9 months ago
Performance Portable Optimizations for Loops Containing Communication Operations
Effective use of communication networks is critical to the performance and scalability of parallel applications. Partitioned Global Address Space languages like UPC bring the pro...
Costin Iancu, Wei Chen, Katherine A. Yelick
MICRO
2007
IEEE
168views Hardware» more  MICRO 2007»
15 years 9 months ago
Global Multi-Threaded Instruction Scheduling
Recently, the microprocessor industry has moved toward chip multiprocessor (CMP) designs as a means of utilizing the increasing transistor counts in the face of physical and micro...
Guilherme Ottoni, David I. August
« Prev « First page 2696 / 2816 Last » Next »