Sciweavers

230 search results - page 35 / 46
» An Empirical Study into Use of Dependency Injection in Java
Sort
View
ASPDAC
2008
ACM
95views Hardware» more  ASPDAC 2008»
13 years 9 months ago
Statistical power profile correlation for realistic thermal estimation
At system level, the on-chip temperature depends both on power density and the thermal coupling with the neighboring regions. The problem of finding the right set of input power pr...
Love Singhal, Sejong Oh, Eli Bozorgzadeh
WOSP
2004
ACM
14 years 28 days ago
Early performance testing of distributed software applications
Performance characteristics, such as response time, throughput and scalability, are key quality attributes of distributed applications. Current practice, however, rarely applies s...
Giovanni Denaro, Andrea Polini, Wolfgang Emmerich
SIGSOFT
2004
ACM
14 years 8 months ago
How a good software practice thwarts collaboration: the multiple roles of APIs in software development
The principle of information hiding has been very influential in software engineering since its inception in 1972. This principle prescribes that software modules hide implementat...
Cleidson R. B. de Souza, David F. Redmiles, Li-Te ...
UAI
2004
13 years 8 months ago
A Bayesian Approach toward Active Learning for Collaborative Filtering
Collaborative filtering is a useful technique for exploiting the preference patterns of a group of users to predict the utility of items for the active user. In general, the perfo...
Rong Jin, Luo Si
IEEESP
2010
99views more  IEEESP 2010»
13 years 6 months ago
The Iterated Weakest Link
Abstract. We devise a model for security investment that reflects dynamic interaction between a defender, who faces uncertainty, and an attacker, who repeatedly targets the weakes...
Rainer Böhme, Tyler Moore