Sciweavers

861 search results - page 75 / 173
» Predicting Attack-prone Components
Sort
View
219
Voted

Book
1497views
16 years 10 months ago
How to Think Like a Computer Scientist: C++ Version
"The goal of this book is to teach you to think like a computer scientist. I like the way computer scientists think because they combine some of the best features of Mathemati...
Allen B. Downey
DAC
2001
ACM
16 years 1 months ago
JouleTrack - A Web Based Tool for Software Energy Profiling
A software energy estimation methodology is presented that avoids explicit characterization of instruction energy consumption and predicts energy consumption to within 3% accuracy...
Amit Sinha, Anantha Chandrakasan
IWPC
2009
IEEE
15 years 7 months ago
Vector space analysis of software clones
In this paper, we introduce a technique for applying Independent Component Analysis to vector space representations of software code fragments such as methods or blocks. The dista...
Scott Grant, James R. Cordy
122
Voted
GLVLSI
1999
IEEE
120views VLSI» more  GLVLSI 1999»
15 years 5 months ago
Adaptive Hard Disk Power Management on Personal Computers
Dynamic power management can be effective for designing low-power systems. In many systems, requests are clustered into sessions. This paper proposes an adaptive algorithm that ca...
Yung-Hsiang Lu, Giovanni De Micheli
89
Voted
CLOUDCOM
2009
Springer
15 years 4 months ago
SPECI, a Simulation Tool Exploring Cloud-Scale Data Centres
There is a rapid increase in the size of data centres (DCs) used to provide cloud computing services. It is commonly agreed that not all properties in the middleware that manages D...
Ilango Sriram