Sciweavers

3104 search results - page 418 / 621
» Using quantitative analysis to implement autonomic IT system...
Sort
View
FCCM
2002
IEEE
171views VLSI» more  FCCM 2002»
15 years 10 months ago
Coarse-Grain Pipelining on Multiple FPGA Architectures
Reconfigurable systems, and in particular, FPGA-based custom computing machines, offer a unique opportunity to define application-specific architectures. These architectures offer...
Heidi E. Ziegler, Byoungro So, Mary W. Hall, Pedro...
CCS
2008
ACM
15 years 7 months ago
Towards an efficient and language-agnostic compliance checker for trust negotiation systems
To ensure that a trust negotiation succeeds whenever possible, authorization policy compliance checkers must be able to find all minimal sets of their owners' credentials tha...
Adam J. Lee, Marianne Winslett
KDD
2008
ACM
186views Data Mining» more  KDD 2008»
16 years 5 months ago
Cut-and-stitch: efficient parallel learning of linear dynamical systems on smps
Multi-core processors with ever increasing number of cores per chip are becoming prevalent in modern parallel computing. Our goal is to make use of the multi-core as well as multi...
Lei Li, Wenjie Fu, Fan Guo, Todd C. Mowry, Christo...
HICSS
2007
IEEE
103views Biometrics» more  HICSS 2007»
15 years 11 months ago
Managing Resistance to Organizational Change: How GSS Can Reveal Role Related Resistance Behaviors
Organizational change brings about a number of behaviors that are seen to run counter to the implementation of the information systems. These behaviors may be seen as jeopardizing...
Sajda Qureshi, Alanah J. Davis
ASPLOS
2006
ACM
15 years 11 months ago
Temporal search: detecting hidden malware timebombs with virtual machines
Worms, viruses, and other malware can be ticking bombs counting down to a specific time, when they might, for example, delete files or download new instructions from a public we...
Jedidiah R. Crandall, Gary Wassermann, Daniela A. ...