Sciweavers

7106 search results - page 1195 / 1422
» Restricted Complexity, General Complexity
Sort
View
NOMS
2006
IEEE
189views Communications» more  NOMS 2006»
15 years 11 months ago
Analysis of Firewall Policy Rules Using Data Mining Techniques
— Firewall is the de facto core technology of today's network security and defense. However, the management of firewall rules has been proven to be complex, error-prone, cos...
Korosh Golnabi, Richard K. Min, Latifur Khan, Ehab...
ASPLOS
2006
ACM
15 years 11 months ago
Combinatorial sketching for finite programs
Sketching is a software synthesis approach where the programmer develops a partial implementation — a sketch — and a separate specification of the desired functionality. The ...
Armando Solar-Lezama, Liviu Tancau, Rastislav Bod&...
163
Voted
CASES
2006
ACM
15 years 11 months ago
Integrated scratchpad memory optimization and task scheduling for MPSoC architectures
Multiprocessor system-on-chip (MPSoC) is an integrated circuit containing multiple instruction-set processors on a single chip that implements most of the functionality of a compl...
Vivy Suhendra, Chandrashekar Raghavan, Tulika Mitr...
187
Voted
MM
2006
ACM
178views Multimedia» more  MM 2006»
15 years 11 months ago
Multimedia signal processing for behavioral quantification in neuroscience
While there have been great advances in quantification of the genotype of organisms, including full genomes for many species, the quantification of phenotype is at a comparatively...
Peter Andrews, Haibin Wang, Dan Valente, Jih&egrav...
MSR
2006
ACM
15 years 11 months ago
MAPO: mining API usages from open source repositories
To improve software productivity, when constructing new software systems, developers often reuse existing class libraries or frameworks by invoking their APIs. Those APIs, however...
Tao Xie, Jian Pei
« Prev « First page 1195 / 1422 Last » Next »