Sciweavers

7103 search results - page 1222 / 1421
» Program Generation and Components
Sort
View
DATE
2005
IEEE
129views Hardware» more  DATE 2005»
15 years 9 months ago
Exploiting Dynamic Workload Variation in Low Energy Preemptive Task Scheduling
A novel energy reduction strategy to maximally exploit the dynamic workload variation is proposed for the offline voltage scheduling of preemptive systems. The idea is to construc...
Lap-Fai Leung, Chi-Ying Tsui, Xiaobo Sharon Hu
EUROMICRO
2005
IEEE
15 years 9 months ago
Software Security Analysis - Execution Phase Audit
Code revision of a leading telecom product was performed, combining manual audit and static analysis tools. On average, one exploitable vulnerability was found for every 4000 line...
Bengt Carlsson, Dejan Baca
ICMCS
2005
IEEE
80views Multimedia» more  ICMCS 2005»
15 years 9 months ago
Maximizing the profit for cache replacement in a transcoding proxy
Recent technology advances in multimedia communication have ushered in a new era of personal communication. Users can ubiquitously access the Internet via various mobile devices. ...
Hao-Ping Hung, Ming-Syan Chen
ICSM
2005
IEEE
15 years 9 months ago
An Empirical Comparison of Test Suite Reduction Techniques for User-Session-Based Testing of Web Applications
Automated cost-effective test strategies are needed to provide reliable, secure, and usable web applications. As a software maintainer updates an application, test cases must accu...
Sara Sprenkle, Sreedevi Sampath, Emily Gibson, Lor...
IDEAS
2005
IEEE
142views Database» more  IDEAS 2005»
15 years 9 months ago
Automatically Maintaining Wrappers for Web Sources
A substantial subset of the web data follows some kind of underlying structure. Nevertheless, HTML does not contain any schema or semantic information about the data it represents...
Juan Raposo, Alberto Pan, Manuel Álvarez, J...
« Prev « First page 1222 / 1421 Last » Next »