Sciweavers

6171 search results - page 1012 / 1235
» The FrameNet Data and Software
Sort
View
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
15 years 11 months ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...
LFCS
2009
Springer
15 years 11 months ago
Completeness Results for Memory Logics
Memory logics are a family of modal logics in which standard relational structures are augmented with data structures and additional operations to modify and query these structure...
Carlos Areces, Santiago Figueira, Sergio Mera
CASES
2009
ACM
15 years 11 months ago
A platform for developing adaptable multicore applications
Computer systems are resource constrained. Application adaptation is a useful way to optimize system resource usage while satisfying the application performance constraints. Previ...
Dan Fay, Li Shang, Dirk Grunwald
UIST
2009
ACM
15 years 11 months ago
Using fNIRS brain sensing in realistic HCI settings: experiments and guidelines
Because functional near-infrared spectroscopy (fNIRS) eases many of the restrictions of other brain sensors, it has potential to open up new possibilities for HCI research. From o...
Erin Treacy Solovey, Audrey Girouard, Krysta Chaun...
CODES
2008
IEEE
15 years 11 months ago
Speculative DMA for architecturally visible storage in instruction set extensions
Instruction set extensions (ISEs) can accelerate embedded processor performance. Many algorithms for ISE generation have shown good potential; some of them have recently been expa...
Theo Kluter, Philip Brisk, Paolo Ienne, Edoardo Ch...
« Prev « First page 1012 / 1235 Last » Next »