Sciweavers

1850 search results - page 146 / 370
» Design-for-debugging of application specific designs
Sort
View
145
Voted
MSS
2000
IEEE
113views Hardware» more  MSS 2000»
15 years 8 months ago
Jiro Storage Management
The Jiro™ technology provides an environment intended for the implementation of storage management solutions. A product based on Jiro technology is an implementation based on th...
Bruce K. Haddon, William H. Connor
145
Voted
CF
2008
ACM
15 years 5 months ago
A distributed evolutionary method to design scheduling policies for volunteer computing
Volunteer Computing (VC) is a paradigm that takes advantage of idle cycles from computing resources donated by volunteers and connected through the Internet to compute large-scale...
Trilce Estrada, Olac Fuentes, Michela Taufer
BMCBI
2006
127views more  BMCBI 2006»
15 years 3 months ago
PathogenMIPer: a tool for the design of molecular inversion probes to detect multiple pathogens
Background: Here we describe PathogenMIPer, a software program for designing molecular inversion probe (MIP) oligonucleotides for use in pathogen identification and detection. The...
Sreedevi Thiyagarajan, Miloslav Karhanek, Michael ...
153
Voted
VL
1997
IEEE
151views Visual Languages» more  VL 1997»
15 years 7 months ago
A Structured Interactive Workspace for a Visual Configuration Language
This paper shows how language technologies such as the automatic generation of parsers for analyzing user actions and visual parsing can be applied to build a flexible tool specia...
Jean-Yves Vion-Dury, François Pacull
222
Voted
ICDE
2007
IEEE
118views Database» more  ICDE 2007»
16 years 5 months ago
Fine Grained Authorization Through Predicated Grants
Authorization in SQL is currently at the level of tables or columns. Many applications need a finer level of control. We propose a model for fine-grained authorization based on ad...
Surajit Chaudhuri, Tanmoy Dutta, S. Sudarshan