Sciweavers

9162 search results - page 1427 / 1833
» System and User Data Complexity
Sort
View
SOFTVIS
2010
ACM
15 years 5 months ago
Towards anomaly comprehension: using structural compression to navigate profiling call-trees
Developers must often diagnose anomalies in programs they only have a partial knowledge of. As a result, they must simultaneously reverse engineer parts of the system they are unf...
Shen Lin 0003, François Taïani, Thomas...
JUCS
2006
104views more  JUCS 2006»
15 years 5 months ago
Introducing the ITP Tool: a Tutorial
: We present a tutorial of the ITP tool, a rewriting-based theorem prover that can be used to prove inductive properties of membership equational specifications. We also introduce ...
Manuel Clavel, Miguel Palomino, Adrián Ries...
JIIS
2002
130views more  JIIS 2002»
15 years 4 months ago
Image Mining: Trends and Developments
Advances in image acquisition and storage technology have led to tremendous growth in very large and detailed image databases. These images, if analyzed, can reveal useful informa...
Wynne Hsu, Mong-Li Lee, Ji Zhang
TII
2010
124views Education» more  TII 2010»
14 years 12 months ago
Address-Independent Estimation of the Worst-case Memory Performance
Abstract--Real-time systems are subject to temporal constraints and require a schedulability analysis to ensure that task execution finishes within lower and upper specified bounds...
Basilio B. Fraguela, Diego Andrade, Ramon Doallo
BWCCA
2010
14 years 11 months ago
Fast Deployment of Computer Forensics with USBs
As popularity of the Internet continues to grow, it changes the way of computer crime. Number of computer crime increases dramatically in recent years and investigators have been f...
Chung-Huang Yang, Pei-Hua Yen
« Prev « First page 1427 / 1833 Last » Next »