Sciweavers

4890 search results - page 741 / 978
» From system specifications to component behavioral models
Sort
View
130
Voted
JCP
2008
216views more  JCP 2008»
15 years 23 days ago
Direct Anonymous Attestation for Next Generation TPM
Trusted computing platforms have been proposed as a promising approach to enhance the security of general-purpose computing systems. Direct Anonymous Attestation(DAA) is a scheme t...
Xiaofeng Chen 0004, Dengguo Feng
116
Voted
MTV
2003
IEEE
109views Hardware» more  MTV 2003»
15 years 6 months ago
A Methodology for Validation of Microprocessors using Equivalence Checking
As embedded systems continue to face increasingly higher performance requirements, deeply pipelined processor architectures are being employed to meet desired system performance. ...
Prabhat Mishra, Nikil D. Dutt
ICDE
2008
IEEE
2751views Database» more  ICDE 2008»
17 years 15 days ago
Skyline Query Processing for Incomplete Data
Recently, there has been much interest in processing skyline queries for various applications that include decision making, personalized services, and search pruning. Skyline queri...
Justin J. Levandoski, Mohamed E. Khalefa, Mohamed ...
108
Voted
KDD
2003
ACM
233views Data Mining» more  KDD 2003»
16 years 1 months ago
SEWeP: using site semantics and a taxonomy to enhance the Web personalization process
Web personalization is the process of customizing a Web site to the needs of each specific user or set of users, taking advantage of the knowledge acquired through the analysis of...
Magdalini Eirinaki, Michalis Vazirgiannis, Iraklis...
93
Voted
ICSE
2004
IEEE-ACM
16 years 26 days ago
An Empirical Comparison of Dynamic Impact Analysis Algorithms
Impact analysis -- determining the potential effects of changes on a software system -- plays an important role in software engineering tasks such as maintenance, regression testi...
Alessandro Orso, Taweesup Apiwattanapong, James La...