Sciweavers

3511 search results - page 512 / 703
» Evaluation Methods for Groupware Systems
Sort
View
KBSE
2008
IEEE
15 years 11 months ago
Cleman: Comprehensive Clone Group Evolution Management
—Recent research results have shown more benefits of the management of code clones, rather than detecting and removing them. However, existing management approaches for code clo...
Tung Thanh Nguyen, Hoan Anh Nguyen, Nam H. Pham, J...
173
Voted
AMFG
2007
IEEE
328views Biometrics» more  AMFG 2007»
15 years 11 months ago
Fusing Gabor and LBP Feature Sets for Kernel-Based Face Recognition
Extending recognition to uncontrolled situations is a key challenge for practical face recognition systems. Finding efficient and discriminative facial appearance descriptors is c...
Xiaoyang Tan, Bill Triggs
BROADNETS
2007
IEEE
15 years 11 months ago
Strategic deployment of network monitors for attack attribution
—Attacks launched over the Internet have become a pressing problem. Attackers make use of a variety of techniques to anonymize their traffic, in order to escape detection and pr...
Young June Pyun, Douglas S. Reeves
FCCM
2007
IEEE
107views VLSI» more  FCCM 2007»
15 years 11 months ago
Optimizing Logarithmic Arithmetic on FPGAs
This paper proposes optimizations of the methods and parameters used in both mathematical approximation and hardware design for logarithmic number system (LNS) arithmetic. First, ...
Haohuan Fu, Oskar Mencer, Wayne Luk
IEEEPACT
2007
IEEE
15 years 11 months ago
Call-chain Software Instruction Prefetching in J2EE Server Applications
We present a detailed characterization of instruction cache performance for IBM’s J2EE-enabled web server, WebSphere Application Server (WAS). When running two J2EE benchmarks o...
Priya Nagpurkar, Harold W. Cain, Mauricio J. Serra...