Sciweavers

8658 search results - page 1505 / 1732
» Models of Command and Control
Sort
View
127
Voted
SEFM
2005
IEEE
15 years 10 months ago
Precise Analysis of Memory Consumption using Program Logics
Memory consumption policies provide a means to control resource usage on constrained devices, and play an important role in ensuring the overall quality of software systems, and i...
Gilles Barthe, Mariela Pavlova, Gerardo Schneider
STEP
2005
IEEE
15 years 10 months ago
Adoption-Centric Software Maintenance Process Improvement via Information Integration
Software process improvement is an iterative activity, normally involving measurement, analysis, and change. For most organizations, the existing software process has substantial ...
Shihong Huang, Scott R. Tilley, Michael VanHilst, ...
TRIDENTCOM
2005
IEEE
15 years 10 months ago
Integrated Network Experimentation using Simulation and Emulation
Discrete-event packet-level network simulation is well-known and widely used. Network emulation is a hybrid approach that combines real elements of a deployed networked applicatio...
Shashi Guruprasad, Robert Ricci, Jay Lepreau
VLSID
2005
IEEE
120views VLSI» more  VLSID 2005»
15 years 10 months ago
On Finding Consecutive Test Vectors in a Random Sequence for Energy-Aware BIST Design
During pseudorandom testing, a significant amount of energy and test application time is wasted for generating and for applying “useless” test vectors that do not contribute t...
Sheng Zhang, Sharad C. Seth, Bhargab B. Bhattachar...
150
Voted
KCAP
2005
ACM
15 years 10 months ago
Towards Browsing Distant Metadata Using Semantic Signatures
In this document, we describe a light-weighted ontology mediation method that allows users to send semantic queries to distant data repositories to browse for learning object meta...
Andrew Choi, Marek Hatala
« Prev « First page 1505 / 1732 Last » Next »