Sciweavers

6431 search results - page 1076 / 1287
» Model Building by Resolution
Sort
View
ISCAS
2008
IEEE
129views Hardware» more  ISCAS 2008»
15 years 10 months ago
Physical unclonable function with tristate buffers
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
Erdinç Öztürk, Ghaith Hammouri, B...
156
Voted
KBSE
2008
IEEE
15 years 10 months ago
Cleman: Comprehensive Clone Group Evolution Management
—Recent research results have shown more benefits of the management of code clones, rather than detecting and removing them. However, existing management approaches for code clo...
Tung Thanh Nguyen, Hoan Anh Nguyen, Nam H. Pham, J...
QEST
2008
IEEE
15 years 10 months ago
KPC-Toolbox: Simple Yet Effective Trace Fitting Using Markovian Arrival Processes
We present the KPC-Toolbox, a collection of Matlab scripts for fitting workload traces into Markovian Arrival Processes (MAPs) in an automatic way. We first present detailed sen...
Giuliano Casale, Eddy Z. Zhang, Evgenia Smirni
126
Voted
TOOLS
2008
IEEE
15 years 10 months ago
Component Reassembling and State Transfer in MaDcAr-Based Self-adaptive Software
In this paper, we introduce MaDcAr, a model of engines for dynamic and automatic (re)assembling of component-based software. In MaDcAr, an application description consists of the d...
Guillaume Grondin, Noury Bouraqadi, Laurent Vercou...
168
Voted
ADBIS
2008
Springer
219views Database» more  ADBIS 2008»
15 years 10 months ago
Data Stream Analysis for Location-Aware Collaborative Information Retrieval
Abstract. We propose a new approach for enhancing collaborative information retrieval by means of incorporating positional data for a location-aware personalized retrieval process....
Andreas Behrend, Frank Reichartz, Christian Dorau,...
« Prev « First page 1076 / 1287 Last » Next »