Sciweavers

2201 search results - page 421 / 441
» Improvement of ASIC Design Processes
Sort
View
IWMM
2009
Springer
152views Hardware» more  IWMM 2009»
15 years 4 months ago
A new approach to parallelising tracing algorithms
Tracing algorithms visit reachable nodes in a graph and are central to activities such as garbage collection, marshalling etc. Traditional sequential algorithms use a worklist, re...
Cosmin E. Oancea, Alan Mycroft, Stephen M. Watt
AUTOMOTIVEUI
2009
ACM
15 years 4 months ago
Usability evaluation of a Volkswagen Group in-vehicle speech system
Driving behavior has been trending towards more time in the car and longer commutes. This has fueled the demand for an increasing number of in-vehicle infotainment features, at th...
Jackie C. Chang, Annie Lien, Brian Lathrop, Holger...
IMC
2009
ACM
15 years 4 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
85
Voted
ISLPED
2009
ACM
178views Hardware» more  ISLPED 2009»
15 years 4 months ago
Power management in energy harvesting embedded systems with discrete service levels
Power management has been a critical issue in the design of embedded systems due to the limited power supply. To prolong the lifetime, energy minimization has been studied under p...
Clemens Moser, Jian-Jia Chen, Lothar Thiele
RECSYS
2009
ACM
15 years 4 months ago
Assessment of conversation co-mentions as a resource for software module recommendation
Conversation double pivots recommend target items related to a source item, based on co-mentions of source and target items in online forums. We deployed several variants on the d...
Daniel Xiaodan Zhou, Paul Resnick