Sciweavers

9626 search results - page 1860 / 1926
» Invariant Based Programming
Sort
View
MICRO
1998
IEEE
144views Hardware» more  MICRO 1998»
15 years 4 months ago
Analyzing the Working Set Characteristics of Branch Execution
To achieve highly accurate branch prediction, it is necessary not only to allocate more resources to branch prediction hardware but also to improve the understanding of branch exe...
Sangwook P. Kim, Gary S. Tyson
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 4 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
IUI
1998
ACM
15 years 4 months ago
U-TEL: A Tool for Eliciting User Task Models from Domain Experts
Eliciting user-task models is a thorny problem in modelbased user interface design, and communicating domainspecific knowledge from an expert to a knowledge engineer is a continui...
R. Chung-Man Tam, David Maulsby, Angel R. Puerta
FCCM
1997
IEEE
199views VLSI» more  FCCM 1997»
15 years 4 months ago
The RAW benchmark suite: computation structures for general purpose computing
The RAW benchmark suite consists of twelve programs designed to facilitate comparing, validating, and improving reconfigurable computing systems. These benchmarks run the gamut o...
Jonathan Babb, Matthew Frank, Victor Lee, Elliot W...
VISUALIZATION
1997
IEEE
15 years 4 months ago
GADGET: goal-oriented application design guidance for modular visualization environments
Modular Visualization Environments (MVEs) have recently been regarded as the de facto standard for scientific data visualization, mainly due to adoption of visual programming sty...
Issei Fujishiro, Yuriko Takeshima, Yoshihiko Ichik...
« Prev « First page 1860 / 1926 Last » Next »