Sciweavers

369 search results - page 67 / 74
» An Automatic Connector Generation Method for Dynamic Archite...
Sort
View
TREC
2007
13 years 8 months ago
Entity-Based Relevance Feedback for Genomic List Answer Retrieval
In this paper we present a system which uses ontological resources and a gene name variation generation tool to expand concepts in the original query. The novelty of our approach ...
Nicola Stokes, Yi Li, Lawrence Cavedon, Eric Huang...
ESOP
2005
Springer
14 years 26 days ago
Asserting Bytecode Safety
Abstract. We instantiate an Isabelle/HOL framework for proof carrying code to Jinja bytecode, a downsized variant of Java bytecode featuring objects, inheritance, method calls and ...
Martin Wildmoser, Tobias Nipkow
DATE
2010
IEEE
157views Hardware» more  DATE 2010»
14 years 12 days ago
RMOT: Recursion in model order for task execution time estimation in a software pipeline
Abstract—This paper addresses the problem of execution time estimation for tasks in a software pipeline independent of the application structure or the underlying architecture. A...
Nabeel Iqbal, M. A. Siddique, Jörg Henkel
PG
2003
IEEE
14 years 18 days ago
Breaking the Walls: Scene Partitioning and Portal Creation
In this paper we revisit the cells-and-portals visibility methods, originally developed for the special case of architectural interiors. We define an effectiveness measure for a ...
Alon Lerner, Yiorgos Chrysanthou, Daniel Cohen-Or
DSOM
2003
Springer
14 years 16 days ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung