Sciweavers

1812 search results - page 193 / 363
» Test Early, Test Often
Sort
View
PASTE
1998
ACM
15 years 2 months ago
OPTVIEW: A New Approach for Examining Optimized Code
The task of mappingbetween source programs and machine code, once the code has been optimizedand transformed by a compiler is often di cult. Yet there are many instances, such as ...
Caroline Tice, Susan L. Graham
KDD
1998
ACM
120views Data Mining» more  KDD 1998»
15 years 2 months ago
Large Datasets Lead to Overly Complex Models: An Explanation and a Solution
This paper explores unexpected results that lie at the intersection of two common themes in the KDD community: large datasets and the goal of building compact models. Experiments ...
Tim Oates, David Jensen
98
Voted
CHI
2007
ACM
15 years 2 months ago
"Get real!": what's wrong with hci prototyping and how can we fix it?
A prototype of computing technology--as a means to evaluate and communicate a good idea--is often an essential step towards useful, shipping products and towards a deeper understa...
William Jones, Jared M. Spool, Jonathan Grudin, Vi...
COMPSAC
2007
IEEE
15 years 2 months ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie
86
Voted
ASPDAC
2008
ACM
122views Hardware» more  ASPDAC 2008»
14 years 12 months ago
Total power optimization combining placement, sizing and multi-Vt through slack distribution management
Power dissipation is quickly becoming one of the most important limiters in nanometer IC design for leakage increases exponentially as the technology scaling down. However, power ...
Tao Luo, David Newmark, David Z. Pan