Sciweavers

1003 search results - page 85 / 201
» Understanding Availability
Sort
View
CODES
2006
IEEE
15 years 5 months ago
Automatic run-time extraction of communication graphs from multithreaded applications
Embedded system synthesis, multiprocessor synthesis, and thread assignment policy design all require detailed knowledge of the runtime communication patterns among different threa...
Ai-Hsin Liu, Robert P. Dick
CSFW
2006
IEEE
15 years 5 months ago
Policy Analysis for Administrative Role Based Access Control
Role-Based Access Control (RBAC) is a widely used model for expressing access control policies. In large organizations, the RBAC policy may be collectively managed by many adminis...
Amit Sasturkar, Ping Yang, Scott D. Stoller, C. R....
ICRA
2006
IEEE
256views Robotics» more  ICRA 2006»
15 years 5 months ago
An Ankle-foot Emulation System for the Study of Human Walking Biomechanics
– Although below-knee prostheses have been commercially available for some time, today’s devices are completely passive, and consequently, their mechanical properties remain fi...
Samuel K. Au, Peter Dilworth, Hugh M. Herr
ICSM
2006
IEEE
15 years 5 months ago
Source-Level Linkage: Adding Semantic Information to C++ Fact-bases
Facts extracted from source code have been used to support a variety of software engineering activities, ranging from architectural understanding, through detection of design patt...
Daqing Hou, H. James Hoover
IISWC
2006
IEEE
15 years 5 months ago
MineBench: A Benchmark Suite for Data Mining Workloads
Abstract— Data mining constitutes an important class of scientific and commercial applications. Recent advances in data extraction techniques have created vast data sets, which ...
Ramanathan Narayanan, Berkin Özisikyilmaz, Jo...