Sciweavers

873 search results - page 162 / 175
» E-voting: Dependability Requirements and Design for Dependab...
Sort
View
MINENET
2006
ACM
15 years 5 months ago
SC2D: an alternative to trace anonymization
Progress in networking research depends crucially on applying novel analysis tools to real-world traces of network activity. This often conflicts with privacy and security requir...
Jeffrey C. Mogul, Martin F. Arlitt
SIGIR
2006
ACM
15 years 5 months ago
A statistical method for system evaluation using incomplete judgments
We consider the problem of large-scale retrieval evaluation, and we propose a statistical method for evaluating retrieval systems using incomplete judgments. Unlike existing techn...
Javed A. Aslam, Virgiliu Pavlu, Emine Yilmaz
MICRO
2005
IEEE
110views Hardware» more  MICRO 2005»
15 years 5 months ago
Scalable Store-Load Forwarding via Store Queue Index Prediction
Conventional processors use a fully-associative store queue (SQ) to implement store-load forwarding. Associative search latency does not scale well to capacities and bandwidths re...
Tingting Sha, Milo M. K. Martin, Amir Roth
KES
2005
Springer
15 years 5 months ago
Position Estimation for Goods Tracking System Using Mobile Detectors
Abstract. Determining physical location of indoor objects is one of the key issues in ubiquitous computing. Although there are many proposals to provide physical location tracking,...
Hiroshi Mineno, Kazuo Hida, Miho Mizutani, Naoto M...
UML
2005
Springer
15 years 5 months ago
Reliability Prediction in Model-Driven Development
Abstract. Evaluating the implications of an architecture design early in the software development lifecycle is important in order to reduce costs of development. Reliability is an ...
Genaína Nunes Rodrigues, David S. Rosenblum...