Sciweavers

1256 search results - page 170 / 252
» Experiences with the DEVStone benchmark
Sort
View
102
Voted
IH
2005
Springer
15 years 6 months ago
Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance
Abstract. Information hiding has been studied in many security applications such as authentication, copyright management and digital forensics. In this work, we introduce a new app...
Ashwin Swaminathan, Yinian Mao, Min Wu, Krishnan K...
ICANN
2005
Springer
15 years 6 months ago
Reducing the Effect of Out-Voting Problem in Ensemble Based Incremental Support Vector Machines
Although Support Vector Machines (SVMs) have been successfully applied to solve a large number of classification and regression problems, they suffer from the catastrophic forgetti...
Zeki Erdem, Robi Polikar, Fikret S. Gürgen, N...
ASPDAC
2004
ACM
109views Hardware» more  ASPDAC 2004»
15 years 6 months ago
Resource-constrained low-power bus encoding with crosstalk delay elimination
— In deep-submicron (DSM) technology, minimizing power consumption of a bus is one of the most important design objectives in embedded system-on-chip (SoC) design. In this paper,...
Meeyoung Cha, Chun-Gi Lyuh, Taewhan Kim
95
Voted
ASPDAC
2004
ACM
102views Hardware» more  ASPDAC 2004»
15 years 6 months ago
TranGen: a SAT-based ATPG for path-oriented transition faults
— This paper presents a SAT-based ATPG tool targeting on a path-oriented transition fault model. Under this fault model, a transition fault is detected through the longest sensit...
Kai Yang, Kwang-Ting Cheng, Li-C. Wang
ISSTA
2004
ACM
15 years 6 months ago
Testing of java web services for robustness
This paper presents a new compile-time analysis that enables a testing methodology for white-box coverage testing of error recovery code (i.e., exception handlers) in Java web ser...
Chen Fu, Barbara G. Ryder, Ana Milanova, David Won...