Sciweavers

2518 search results - page 62 / 504
» Using Communication Objects During Requirements Analysis
Sort
View
115
Voted
ACL
2004
15 years 3 months ago
Optimizing Typed Feature Structure Grammar Parsing through Non-Statistical Indexing
This paper introduces an indexing method based on static analysis of grammar rules and type signatures for typed feature structure grammars (TFSGs). The static analysis tries to p...
Cosmin Munteanu, Gerald Penn
138
Voted
CEC
2010
IEEE
15 years 3 months ago
An analysis of massively distributed evolutionary algorithms
Computational science is placing new demands on optimization algorithms as the size of data sets and the computational complexity of scientific models continue to increase. As thes...
Travis J. Desell, David P. Anderson, Malik Magdon-...
118
Voted
JSSPP
2009
Springer
15 years 9 months ago
Scalability Analysis of Job Scheduling Using Virtual Nodes
It is important to identify scalability constraints in existing job scheduling software as they are applied to next generation parallel systems. In this paper, we analyze the scala...
Norman Bobroff, Richard Coppinger, Liana Fong, See...
RECONFIG
2009
IEEE
165views VLSI» more  RECONFIG 2009»
15 years 9 months ago
Composable and Persistent-State Application Swapping on FPGAs Using Hardwired Network on Chip
—We envision that future FPGA will use a hardwired network on chip (HWNoC) [14] as a unified interconnect for functional communications (data and control) as well as configurat...
Muhammad Aqeel Wahlah, Kees G. W. Goossens
174
Voted
FASE
2008
Springer
15 years 4 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu