Sciweavers

4650 search results - page 671 / 930
» Generating and evaluating evaluative arguments
Sort
View
LCTRTS
2005
Springer
15 years 10 months ago
Probabilistic source-level optimisation of embedded programs
Efficient implementation of DSP applications is critical for many embedded systems. Optimising C compilers for embedded processors largely focus on code generation and instructio...
Björn Franke, Michael F. P. O'Boyle, John Tho...
SEKE
2005
Springer
15 years 10 months ago
Application of Design Combinatorial Theory to Scenario-Based Software Architecture Analysis
Design combinatorial theory for test-case generation has been used successfully in the past. It is useful in optimizing test cases as it is practically impossible to exhaustively t...
Chung-Horng Lung, Marzia Zaman
UML
2005
Springer
15 years 10 months ago
Replicators: Transformations to Address Model Scalability
In Model Integrated Computing, it is often desirable to evaluate different design alternatives as they relate to issues of scalability. A typical approach to address scalability is...
Jeffrey G. Gray, Yuehua Lin, Jing Zhang, Steven No...
VLDB
2005
ACM
134views Database» more  VLDB 2005»
15 years 10 months ago
MDL Summarization with Holes
Summarization of query results is an important problem for many OLAP applications. The Minimum Description Length principle has been applied in various studies to provide summarie...
Shaofeng Bu, Laks V. S. Lakshmanan, Raymond T. Ng
ACMSE
2004
ACM
15 years 10 months ago
A framework for trusted instruction execution via basic block signature verification
Most of today’s computers are connected to the Internet or at least to a local network, exposing system vulnerabilities to the potential attackers. One of the attackers’ goals...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...