Sciweavers

1848 search results - page 227 / 370
» A Question Answering System for the Operation of Software Ap...
Sort
View
CISC
2007
Springer
98views Cryptology» more  CISC 2007»
14 years 3 months ago
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM
Abstract. The Trusted Computing Group (TCG) defines the specifications for the Trusted Platform Module (TPM) and corresponding trust mechanisms that allow a TPM-enabled platform ...
Yongdong Wu, Feng Bao, Robert H. Deng, Marc Mouffr...
CODES
2010
IEEE
13 years 7 months ago
A greedy buffer allocation algorithm for power-aware communication in body sensor networks
Monitoring human movements using wireless sensory devices promises to revolutionize the delivery of healthcare services. In spite of their potentials for many application domains,...
Hassan Ghasemzadeh, Roozbeh Jafari
IPPS
2008
IEEE
14 years 3 months ago
Adaptive tuning in a dynamically changing resource environment
We present preliminary results of a project to create a tuning system that adaptively optimizes programs to the underlying execution platform. We will show initial results from tw...
Seyong Lee, Rudolf Eigenmann
FPGA
1998
ACM
148views FPGA» more  FPGA 1998»
14 years 1 months ago
Configuration Prefetch for Single Context Reconfigurable Coprocessors
Current reconfigurable systems suffer from a significant overhead due to the time it takes to reconfigure their hardware. In order to deal with this overhead, and increase the com...
Scott Hauck
ICDM
2009
IEEE
148views Data Mining» more  ICDM 2009»
14 years 3 months ago
Online System Problem Detection by Mining Patterns of Console Logs
Abstract—We describe a novel application of using data mining and statistical learning methods to automatically monitor and detect abnormal execution traces from console logs in ...
Wei Xu, Ling Huang, Armando Fox, David Patterson, ...