Sciweavers

16968 search results - page 3295 / 3394
» Software Engineering in the Small
Sort
View
OOPSLA
2007
Springer
15 years 11 months ago
The design and implementation of formal monitoring techniques
In runtime monitoring, a programmer specifies a piece of code to execute when a trace of events occurs during program execution. Previous and related work has shown that runtime m...
Eric Bodden
RAID
2007
Springer
15 years 11 months ago
SpyShield: Preserving Privacy from Spy Add-Ons
Spyware infections are becoming extremely pervasive, posing a grave threat to Internet users’ privacy. Control of such an epidemic is increasingly difficult for the existing def...
Zhuowei Li, XiaoFeng Wang, Jong Youl Choi
ICDM
2006
IEEE
131views Data Mining» more  ICDM 2006»
15 years 11 months ago
Intelligent Icons: Integrating Lite-Weight Data Mining and Visualization into GUI Operating Systems
The vast majority of visualization tools introduced so far are specialized pieces of software that are explicitly run on a particular dataset at a particular time for a particular...
Eamonn J. Keogh, Li Wei, Xiaopeng Xi, Stefano Lona...
ISCAS
2006
IEEE
133views Hardware» more  ISCAS 2006»
15 years 11 months ago
A psychiatric patients tracking system
This paper presents an RFID based psychiatric critical to psychiatric patient treatment. The work oftracking patient tracking system in a psychiatric patient care center. In psychi...
Ming-Hua Tsai, Chieh-Ling Huang, Pau-Choo Chung, Y...
CASES
2006
ACM
15 years 11 months ago
Reducing energy of virtual cache synonym lookup using bloom filters
Virtual caches are employed as L1 caches of both high performance and embedded processors to meet their short latency requirements. However, they also introduce the synonym proble...
Dong Hyuk Woo, Mrinmoy Ghosh, Emre Özer, Stua...
« Prev « First page 3295 / 3394 Last » Next »