Sciweavers

2385 search results - page 315 / 477
» Knowledge Refinement for a Design System
Sort
View
128
Voted
CASES
2005
ACM
15 years 5 months ago
Micro embedded monitoring for security in application specific instruction-set processors
This paper presents a methodology for monitoring security in Application Specific Instruction-set Processors (ASIPs). This is a generalized methodology for inline monitoring insec...
Roshan G. Ragel, Sri Parameswaran, Sayed Mohammad ...
IJNSEC
2006
77views more  IJNSEC 2006»
15 years 3 months ago
Towards a Secure Copyright Protection Infrastructure for e-Education Material: Principles Learned from Experience
Copyright of e-Education material is valuable. The need for protecting it is prominent. In the past two years, we have developed an infrastructure called e-Course eXchange (eCX ) ...
Joe Cho-Ki Yau, Lucas Chi Kwong Hui, Siu-Ming Yiu,...
130
Voted
TNN
2008
132views more  TNN 2008»
15 years 3 months ago
Just-in-Time Adaptive Classifiers - Part I: Detecting Nonstationary Changes
Abstract--The stationarity requirement for the process generating the data is a common assumption in classifiers' design. When such hypothesis does not hold, e.g., in applicat...
Cesare Alippi, Manuel Roveri
164
Voted
HUC
2010
Springer
15 years 2 months ago
EnergyLife: pervasive energy awareness for households
We present Energy Life a system utilizing wireless sensors, mobile and ambient interfaces that turn energy consumers into active players. Energy Life participants play through dif...
Christoffer Björkskog, Giulio Jacucci, Lucian...
211
Voted
ICDCSW
2011
IEEE
14 years 3 months ago
Cross-Examination of Datacenter Workload Modeling Techniques
Datacenter workload modeling has become a necessity in recent years due to the emergence of large-scale applications and cloud data-stores, whose implementation remains largely un...
Christina Delimitrou, Christos Kozyrakis