Sciweavers

3911 search results - page 682 / 783
» Using Operational Architecture to Model Embedded Software
Sort
View
JSA
2008
94views more  JSA 2008»
15 years 4 months ago
Energy reduction through crosstalk avoidance coding in networks on chip
Commercial designs are currently integrating from 10 to 100 embedded processors in a single system on chip (SoC) and the number is likely to increase significantly in the near fut...
Partha Pratim Pande, Amlan Ganguly, Haibo Zhu, Cri...
KDD
2007
ACM
335views Data Mining» more  KDD 2007»
16 years 5 months ago
Detecting changes in large data sets of payment card data: a case study
An important problem in data mining is detecting changes in large data sets. Although there are a variety of change detection algorithms that have been developed, in practice it c...
Chris Curry, Robert L. Grossman, David Locke, Stev...
EUROMICRO
2000
IEEE
15 years 9 months ago
Agent-Based Adaptive Selection and Interaction to Z39.50 Servers
Digital libraries and OPACs are offering an enormous collection of information resources which can be accessed through Internet by quite different users thanks to the existence of...
Camino Fernández, Ignacio Aedo, Paloma D&ia...
138
Voted
SIGSOFT
1998
ACM
15 years 9 months ago
Reasoning about Implicit Invocation
Implicit invocation SN92, GN91] has become an important architectural style for large-scale system design and evolution. This paper addresses the lack of speci cation and veri cat...
David Garlan, Somesh Jha, David Notkin
ATAL
2006
Springer
15 years 6 months ago
ReAgents: behavior-based remote agents and their performance
We present a performance analysis of an agent-based middleware system we have developed based on "reAgents," remotely executing agents that enhance the performance of cl...
Eugene Hung, Joseph Pasquale