Sciweavers

535 search results - page 85 / 107
» Predicting Application Run Times Using Historical Informatio...
Sort
View
DEXA
2004
Springer
147views Database» more  DEXA 2004»
15 years 2 months ago
A Flexible Fuzzy Expert System for Fuzzy Duplicate Elimination in Data Cleaning
Data cleaning deals with the detection and removal of errors and inconsistencies in data, gathered from distributed sources. This process is essential for drawing correct conclusio...
Hamid Haidarian Shahri, Ahmad Abdollahzadeh Barfor...
ICHIT
2009
Springer
15 years 2 months ago
Creating an autonomous dancing robot
A robot with the ability to dance autonomously has many potential applications, such as serving as a prototype dancer for choreographers or as a participant in stage performances ...
David Grunberg, Robert Ellenberg, Youngmoo Kim, Pa...
CIKM
2001
Springer
15 years 2 months ago
Tempus Fugit: A System for Making Semantic Connections
Tempus Fugit (“Time Flies”) is the first of a new generation of Personal Information Management (PIM) systems. A PIM system incorporates an electronic calendar, “to-do” li...
Daniel Alexander Ford, Joann Ruvolo, Stefan Edlund...
100
Voted
SIGSOFT
2008
ACM
15 years 10 months ago
Finding programming errors earlier by evaluating runtime monitors ahead-of-time
Runtime monitoring allows programmers to validate, for instance, the proper use of application interfaces. Given a property specification, a runtime monitor tracks appropriate run...
Eric Bodden, Patrick Lam, Laurie J. Hendren
75
Voted
DAC
2008
ACM
14 years 11 months ago
SHIELD: a software hardware design methodology for security and reliability of MPSoCs
Security of MPSoCs is an emerging area of concern in embedded systems. Security is jeopardized by code injection attacks, which are the most common types of software attacks. Prev...
Krutartha Patel, Sri Parameswaran