Sciweavers

4330 search results - page 760 / 866
» Analyzing security architectures
Sort
View
117
Voted
CSMR
2003
IEEE
15 years 9 months ago
Software Clustering Techniques and the Use of Combined Algorithm
As the age of software systems increases they tend to deviate from their actual design and architecture. It becomes more and more difficult to manage and maintain such systems. We...
M. Saeed, Onaiza Maqbool, Haroon A. Babri, Syed Za...
162
Voted
EUROMICRO
2003
IEEE
15 years 9 months ago
A General Model for Component-Based Software Reliability
: The approach of aggregating components into complex software systems is maturing with the rapid development of component technology. How to analyze software reliability from syst...
Mao Xiaoguang, Deng Yongjin
112
Voted
FTDCS
2003
IEEE
15 years 9 months ago
Looking for a Common View for Mobile Worlds
This paper considers central issues of distributed computing in a mobile environment. Its aim is to light on the first brick of a common view for mobile systems. We pool together...
Maria Gradinariu, Michel Raynal, Gwendal Simon
136
Voted
MICRO
2003
IEEE
99views Hardware» more  MICRO 2003»
15 years 9 months ago
Power-driven Design of Router Microarchitectures in On-chip Networks
As demand for bandwidth increases in systems-on-a-chip and chip multiprocessors, networks are fast replacing buses and dedicated wires as the pervasive interconnect fabric for on-...
Hangsheng Wang, Li-Shiuan Peh, Sharad Malik
154
Voted
SBACPAD
2003
IEEE
180views Hardware» more  SBACPAD 2003»
15 years 9 months ago
New Parallel Algorithms for Frequent Itemset Mining in Very Large Databases
Frequent itemset mining is a classic problem in data mining. It is a non-supervised process which concerns in finding frequent patterns (or itemsets) hidden in large volumes of d...
Adriano Veloso, Wagner Meira Jr., Srinivasan Parth...