Sciweavers

897 search results - page 84 / 180
» Maintenance-Oriented Design and Development: A Case Study
Sort
View
100
Voted
DAC
2005
ACM
16 years 1 months ago
Fine-grained application source code profiling for ASIP design
Current Application Specific Instruction set Processor (ASIP) design methodologies are mostly based on iterative architecture exploration that uses Architecture Description Langua...
Kingshuk Karuri, Mohammad Abdullah Al Faruque, Ste...
CHI
2003
ACM
16 years 29 days ago
The challenges of user-centered design and evaluation for infrastructure
Infrastructure software comprises code libraries or runtime processes that support the development or operation of application software. A particular infrastructure system may sup...
W. Keith Edwards, Victoria Bellotti, Anind K. Dey,...
99
Voted
PODS
2006
ACM
104views Database» more  PODS 2006»
16 years 22 days ago
Tractable database design through bounded treewidth
Given that most elementary problems in database design are NP-hard, the currently used database design algorithms produce suboptimal results. For example, the current 3NF decompos...
Georg Gottlob, Reinhard Pichler, Fang Wei
ACMDIS
2004
ACM
15 years 6 months ago
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
Privacy is a difficult design issue that is becoming increasingly important as we push into ubiquitous computing environments. While there is a fair amount of theoretical work on ...
Jason I. Hong, Jennifer D. Ng, Scott Lederer, Jame...
CHES
2009
Springer
150views Cryptology» more  CHES 2009»
15 years 7 months ago
A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions
Power-based side channel attacks are a significant security risk, especially for embedded applications. To improve the security of such devices, protected logic styles have been p...
Francesco Regazzoni, Alessandro Cevrero, Fran&cced...