Sciweavers

44 search results - page 6 / 9
» Reuse of Specification Patterns with the B Method
Sort
View
DAC
2002
ACM
15 years 10 months ago
Exploiting shared scratch pad memory space in embedded multiprocessor systems
In this paper, we present a compiler strategy to optimize data accesses in regular array-intensive applications running on embedded multiprocessor environments. Specifically, we p...
Mahmut T. Kandemir, J. Ramanujam, Alok N. Choudhar...
BMCBI
2006
114views more  BMCBI 2006»
14 years 9 months ago
Mining frequent patterns for AMP-activated protein kinase regulation on skeletal muscle
Background: AMP-activated protein kinase (AMPK) has emerged as a significant signaling intermediary that regulates metabolisms in response to energy demand and supply. An investig...
Qingfeng Chen, Yi-Ping Phoebe Chen
82
Voted
ACSAC
2007
IEEE
15 years 3 months ago
MetaAware: Identifying Metamorphic Malware
Detection of malicious software (malware) by the use of static signatures is often criticized for being overly simplistic. Available methods of obfuscating code (so-called metamor...
Qinghua Zhang, Douglas S. Reeves
PERSUASIVE
2007
Springer
15 years 3 months ago
The Behavior Chain for Online Participation: How Successful Web Services Structure Persuasion
The success of many online services today depends on the company’s ability to persuade users to take specific actions, such as registering or inviting friends. We examined over 5...
B. J. Fogg, Dean Eckles
77
Voted
ICWE
2005
Springer
15 years 3 months ago
Discovering Re-usable Design Solutions in Web Conceptual Schemas: Metrics and Methodology
Abstract. In the Internet era, the development of Web applications has impressively evolved and is characterized by a large degree of complexity. To this end, software community ha...
Yannis Panagis, Evangelos Sakkopoulos, Spiros Sirm...