Sciweavers

1063 search results - page 75 / 213
» Programming Methodologies in GCLA
Sort
View
ASPLOS
2010
ACM
15 years 7 months ago
Characterizing processor thermal behavior
Temperature is a dominant factor in the performance, reliability, and leakage power consumption of modern processors. As a result, increasing numbers of researchers evaluate therm...
Francisco J. Mesa-Martinez, Ehsan K. Ardestani, Jo...
72
Voted
GECCO
2005
Springer
15 years 6 months ago
Evaluating GP schema in context
We propose a new methodology to look at the fitness contributions (semantics) of different schemata in Genetic Programming (GP). We hypothesize that the significance of a schem...
Hammad Majeed, Conor Ryan, R. Muhammad Atif Azad
106
Voted
RE
2005
Springer
15 years 6 months ago
Reverse Engineering Goal Models from Legacy Code
A reverse engineering process aims at reconstructing el abstractions from source code. This paper presents a novel reverse engineering methodology for recovering stakeholder goal ...
Yijun Yu, Yiqiao Wang, John Mylopoulos, Sotirios L...
101
Voted
INFOCOM
2003
IEEE
15 years 5 months ago
Modeling Malware Spreading Dynamics
— In this paper we present analytical techniques that can be used to better understand the behavior of malware, a generic term that refers to all kinds of malicious software prog...
Michele Garetto, Weibo Gong, Donald F. Towsley
EOR
2002
165views more  EOR 2002»
15 years 12 days ago
Review of ranking methods in the data envelopment analysis context
Within data envelopment analysis (DEA) is a sub-group of papers in which many researchers have sought to improve the differential capabilities of DEA and to fully rank both effici...
Nicole Adler, Lea Friedman, Zilla Sinuany-Stern