Sciweavers

8503 search results - page 1411 / 1701
» Secure Software Architectures
Sort
View
ICAC
2009
IEEE
15 years 10 months ago
Applying adaptation design patterns
Dynamic adaptation may be used to prevent software downtime while new requirements and responses to environmental conditions are incorporated into the system. Previously, we studi...
Andres J. Ramirez, Betty H. C. Cheng
WCRE
2009
IEEE
15 years 10 months ago
NTrace: Function Boundary Tracing for Windows on IA-32
—For a long time, dynamic tracing has been an enabling technique for reverse engineering tools. Tracing can not only be used to record the control flow of a particular component...
Johannes Passing, Alexander Schmidt, Martin von L&...
EUROPAR
2009
Springer
15 years 10 months ago
High Performance Matrix Multiplication on Many Cores
Moore’s Law suggests that the number of processing cores on a single chip increases exponentially. The future performance increases will be mainly extracted from thread-level par...
Nan Yuan, Yongbin Zhou, Guangming Tan, Junchao Zha...
146
Voted
GECCO
2009
Springer
166views Optimization» more  GECCO 2009»
15 years 10 months ago
Genetic programming in the wild: evolving unrestricted bytecode
We describe a methodology for evolving Java bytecode, enabling the evolution of extant, unrestricted Java programs, or programs in other languages that compile to Java bytecode. B...
Michael Orlov, Moshe Sipper
131
Voted
NOSSDAV
2009
Springer
15 years 10 months ago
SLIPstream: scalable low-latency interactive perception on streaming data
A critical problem in implementing interactive perception applications is the considerable computational cost of current computer vision and machine learning algorithms, which typ...
Padmanabhan Pillai, Lily B. Mummert, Steven W. Sch...
« Prev « First page 1411 / 1701 Last » Next »