Recovering the architecture is the first step towards reengineering a software system. Many reverse engineering tools use top-down exploration as a way of providing a visual and ...
High-level synthesis (HLS) has been successfully targeted towards the digital signal processing (DSP) domain. Both application-specic integrated circuits (ASICs) and application-...
Numerous data center services exhibit low average utilization leading to poor energy efficiency. Although CPU voltage and frequency scaling historically has been an effective mea...
Information leakage via the networks formed by subjects (e.g., Facebook, Twitter) and objects (e.g., blogosphere) − some of whom may be controlled by malicious insiders − ofte...
Fighting global security threats with only a local view is inherently difficult. Internet network operators need to fight global phenomena such as botnets, but they are hampered...
Jason Reed, Adam J. Aviv, Daniel Wagner, Andreas H...