Sciweavers

1336 search results - page 222 / 268
» codes 2005
Sort
View
HIPEAC
2005
Springer
15 years 3 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee
HPCC
2005
Springer
15 years 3 months ago
A Loop-Aware Search Strategy for Automated Performance Analysis
Abstract. Automated online search is a powerful technique for performance diagnosis. Such a search can change the types of experiments it performs while the program is running, mak...
Eli D. Collins, Barton P. Miller
ICAPR
2005
Springer
15 years 3 months ago
Applying Software Analysis Technology to Lightweight Semantic Markup of Document Text
Abstract. Software analysis techniques, and in particular software “design recovery”, have been highly successful at both technical and businesslevel semantic markup of large s...
Nadzeya Kiyavitskaya, Nicola Zeni, James R. Cordy,...
ICCSA
2005
Springer
15 years 3 months ago
A Performance Improvement Scheme of Stream Control Transmission Protocol over Wireless Networks
Abstract. Today’s computer network is shifting from wired networks to wireless networks. Several attempts have been made to assess the performance of TCP over wireless networks. ...
Kiwon Hong, Kugsang Jeong, Deokjai Choi, Choong Se...
ICWE
2005
Springer
15 years 3 months ago
An Investigation of Cloning in Web Applications
Cloning (ad hoc reuse by duplication of design or code) speeds up development, but also hinders future maintenance. Cloning also hints at reuse opportunities that, if exploited sys...
Damith C. Rajapakse, Stan Jarzabek