Sciweavers

6514 search results - page 1061 / 1303
» Low-Knowledge Algorithm Control
Sort
View
125
Voted
IMC
2005
ACM
15 years 8 months ago
The Power of Slicing in Internet Flow Measurement
Flow measurement evolved into the primary method for measuring the composition of Internet traffic. Large ISPs and small networks use it to track dominant applications, dominant ...
Ramana Rao Kompella, Cristian Estan
108
Voted
ISLPED
2005
ACM
100views Hardware» more  ISLPED 2005»
15 years 8 months ago
A tunable bus encoder for off-chip data buses
Off-Chip buses constitute a significant portion of the total system power in embedded systems. Past research has focused on encoding contiguous bit positions in data values to red...
Dinesh C. Suresh, Banit Agrawal, Jun Yang 0002, Wa...
124
Voted
MM
2005
ACM
160views Multimedia» more  MM 2005»
15 years 8 months ago
Putting active learning into multimedia applications: dynamic definition and refinement of concept classifiers
The authors developed an extensible system for video exploitation that puts the user in control to better accommodate novel situations and source material. Visually dense displays...
Ming-yu Chen, Michael G. Christel, Alexander G. Ha...
134
Voted
SAC
2005
ACM
15 years 8 months ago
Towards the prioritization of regression test suites with data flow information
Regression test prioritization techniques re-order the execution of a test suite in an attempt to ensure that defects are revealed earlier in the test execution phase. In prior wo...
Matthew J. Rummel, Gregory M. Kapfhammer, Andrew T...
133
Voted
ECOOP
2005
Springer
15 years 8 months ago
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection
In Java 2 and Microsoft .NET Common Language Runtime (CLR), trusted code has often been programmed to perform accessrestricted operations not explicitly requested by its untrusted ...
Marco Pistoia, Robert J. Flynn, Larry Koved, Vugra...
« Prev « First page 1061 / 1303 Last » Next »