Sciweavers

2421 search results - page 112 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
109
Voted
ACSAC
2007
IEEE
15 years 7 months ago
Establishing and Sustaining System Integrity via Root of Trust Installation
Integrity measurements provide a means by which distributed systems can assess the trustability of potentially compromised remote hosts. However, current measurement techniques si...
Luke St. Clair, Joshua Schiffman, Trent Jaeger, Pa...
DAWAK
2000
Springer
15 years 5 months ago
Optimal Multidimensional Query Processing Using Tree Striping
In this paper, we propose a new technique for multidimensional query processing which can be widely applied in database systems. Our new technique, called tree striping, generalize...
Stefan Berchtold, Christian Böhm, Daniel A. K...
SIGSOFT
2003
ACM
16 years 1 months ago
Regression testing of GUIs
Although graphical user interfaces (GUIs) constitute a large part of the software being developed today and are typically created using rapid prototyping, there are no effective r...
Atif M. Memon, Mary Lou Soffa
97
Voted
ACMSE
2008
ACM
15 years 2 months ago
Training approaches in neural enhancement for multiobjective optimization
In previous work, a neural network was used to increase the number of solutions found by an evolutionary multiobjective optimization algorithm. In this paper, various approaches a...
Aaron Garrett, Gerry V. Dozier
104
Voted
VLSID
2008
IEEE
128views VLSI» more  VLSID 2008»
16 years 1 months ago
A Novel Approach to Compute Spatial Reuse in the Design of Custom Instructions
In the automatic design of custom instruction set processors, there can be a very large set of potential custom instructions, from which a few instructions are required to be chos...
Nagaraju Pothineni, Anshul Kumar, Kolin Paul