Sciweavers

8503 search results - page 1411 / 1701
» Secure Software Architectures
Sort
View
110
Voted
ICAC
2009
IEEE
15 years 7 months ago
Applying adaptation design patterns
Dynamic adaptation may be used to prevent software downtime while new requirements and responses to environmental conditions are incorporated into the system. Previously, we studi...
Andres J. Ramirez, Betty H. C. Cheng
96
Voted
WCRE
2009
IEEE
15 years 7 months ago
NTrace: Function Boundary Tracing for Windows on IA-32
—For a long time, dynamic tracing has been an enabling technique for reverse engineering tools. Tracing can not only be used to record the control flow of a particular component...
Johannes Passing, Alexander Schmidt, Martin von L&...
96
Voted
EUROPAR
2009
Springer
15 years 7 months ago
High Performance Matrix Multiplication on Many Cores
Moore’s Law suggests that the number of processing cores on a single chip increases exponentially. The future performance increases will be mainly extracted from thread-level par...
Nan Yuan, Yongbin Zhou, Guangming Tan, Junchao Zha...
GECCO
2009
Springer
166views Optimization» more  GECCO 2009»
15 years 7 months ago
Genetic programming in the wild: evolving unrestricted bytecode
We describe a methodology for evolving Java bytecode, enabling the evolution of extant, unrestricted Java programs, or programs in other languages that compile to Java bytecode. B...
Michael Orlov, Moshe Sipper
NOSSDAV
2009
Springer
15 years 7 months ago
SLIPstream: scalable low-latency interactive perception on streaming data
A critical problem in implementing interactive perception applications is the considerable computational cost of current computer vision and machine learning algorithms, which typ...
Padmanabhan Pillai, Lily B. Mummert, Steven W. Sch...
« Prev « First page 1411 / 1701 Last » Next »