Sciweavers

4421 search results - page 586 / 885
» Libraries
Sort
View
VLSID
2008
IEEE
142views VLSI» more  VLSID 2008»
15 years 9 months ago
Incorporating PVT Variations in System-Level Power Exploration of On-Chip Communication Architectures
With the shift towards deep sub-micron (DSM) technologies, the increase in leakage power and the adoption of poweraware design methodologies have resulted in potentially significa...
Sudeep Pasricha, Young-Hwan Park, Fadi J. Kurdahi,...
143
Voted
WCRE
2008
IEEE
15 years 9 months ago
Discovering New Change Patterns in Object-Oriented Systems
Modern software has to evolve to meet the needs of stakeholders; but the nature and scope of this evolution is difficult to anticipate and manage. In this paper, we examine techn...
Stéphane Vaucher, Houari A. Sahraoui, Jean ...
AFP
2008
Springer
249views Formal Methods» more  AFP 2008»
15 years 9 months ago
An iTask Case Study: A Conference Management System
Workflow systems are automated systems in which tasks are coordinated by assigning them to either humans or computers. Contemporary workflow systems are static and not very flex...
Rinus Plasmeijer, Peter Achten, Pieter W. M. Koopm...
AH
2008
Springer
15 years 9 months ago
Social Information Access for the Rest of Us: An Exploration of Social YouTube
The motivation behind many Information Retrieval systems is to identify and present relevant information to people given their current goals and needs. Learning about user preferen...
Maurice Coyle, Jill Freyne, Peter Brusilovsky, Bar...
ACSAC
2007
IEEE
15 years 9 months ago
MetaAware: Identifying Metamorphic Malware
Detection of malicious software (malware) by the use of static signatures is often criticized for being overly simplistic. Available methods of obfuscating code (so-called metamor...
Qinghua Zhang, Douglas S. Reeves