Sciweavers

6656 search results - page 1132 / 1332
» Change, Change, Change: Three Approaches
Sort
View
DAC
2006
ACM
14 years 10 months ago
Novel full-chip gridless routing considering double-via insertion
As the technology node advances into the nanometer era, via-open defects are one of the dominant failures. To improve via yield and reliability, redundant-via insertion is a highl...
Huang-Yu Chen, Mei-Fang Chiang, Yao-Wen Chang, Lum...
IEEEPACT
2009
IEEE
14 years 4 months ago
StealthTest: Low Overhead Online Software Testing Using Transactional Memory
—Software testing is hard. The emergence of multicore architectures and the proliferation of bugprone multithreaded software makes testing even harder. To this end, researchers h...
Jayaram Bobba, Weiwei Xiong, Luke Yen, Mark D. Hil...
IPCCC
2007
IEEE
14 years 3 months ago
Optimising Networks Against Malware
Rapidly-spreading malicious software is an important threat on today’s computer networks. Most solutions that have been proposed to counter this threat are based on our ability ...
Pierre-Marc Bureau, José M. Fernandez
MSR
2006
ACM
14 years 3 months ago
Using software birthmarks to identify similar classes and major functionalities
Software birthmarks are unique and native characteristics of every software component. Two components having similar birthmarks indicate that they are similar in functionality, st...
Takeshi Kakimoto, Akito Monden, Yasutaka Kamei, Ha...
JCDL
2004
ACM
100views Education» more  JCDL 2004»
14 years 2 months ago
A document corpus browser for in-depth reading
Software tools, including Web browsers, e-books, electronic document formats, search engines, and digital libraries are changing the way people read, making it easier for them to ...
Eric A. Bier, Lance Good, Kris Popat, Alan Newberg...
« Prev « First page 1132 / 1332 Last » Next »