Sciweavers

7778 search results - page 1430 / 1556
» Designing Controllers for Reachability
Sort
View
123
Voted
ASE
2006
110views more  ASE 2006»
15 years 3 months ago
Runtime recovery and manipulation of software architecture of component-based systems
Recently, more attention is paid to the researches and practices on how to use software architecture in software maintenance and evolution to reduce their complexity and cost. The ...
Gang Huang, Hong Mei, Fuqing Yang
155
Voted
BMCBI
2006
130views more  BMCBI 2006»
15 years 3 months ago
Laboratory Information Management Software for genotyping workflows: applications in high throughput crop genotyping
Background: With the advances in DNA sequencer-based technologies, it has become possible to automate several steps of the genotyping process leading to increased throughput. To e...
B. Jayashree, Praveen T. Reddy, Y. Leeladevi, Jona...
ISCA
2008
IEEE
201views Hardware» more  ISCA 2008»
15 years 3 months ago
iDEAL: Inter-router Dual-Function Energy and Area-Efficient Links for Network-on-Chip (NoC) Architectures
Network-on-Chip (NoC) architectures have been adopted by a growing number of multi-core designs as a flexible and scalable solution to the increasing wire delay constraints in the...
Avinash Karanth Kodi, Ashwini Sarathy, Ahmed Louri
140
Voted
IJDE
2006
95views more  IJDE 2006»
15 years 3 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
CORR
2007
Springer
135views Education» more  CORR 2007»
15 years 3 months ago
AMIEDoT: An annotation model for document tracking and recommendation service
The primary objective of document annotation in whatever form, manual or electronic is to allow those who may not have control to original document to provide personal view on inf...
Charles A. Robert
« Prev « First page 1430 / 1556 Last » Next »