Sciweavers

2211 search results - page 296 / 443
» Comparing Approaches to Implement Feature Model Composition
Sort
View
ISCA
2007
IEEE
128views Hardware» more  ISCA 2007»
14 years 3 months ago
Performance and security lessons learned from virtualizing the alpha processor
Virtualization has become much more important throughout the computer industry both to improve security and to support multiple workloads on the same hardware with effective isola...
Paul A. Karger
MMM
2007
Springer
135views Multimedia» more  MMM 2007»
14 years 3 months ago
Ontology-Based Annotation of Paintings Using Transductive Inference Framework
Domain-specific knowledge of paintings defines a wide range of concepts for annotation and flexible retrieval of paintings. In this work, we employ the ontology of artistic concept...
Yelizaveta Marchenko, Tat-Seng Chua, Ramesh Jain
SIGOPS
2008
152views more  SIGOPS 2008»
13 years 9 months ago
The Caernarvon secure embedded operating system
The Caernarvon operating system was developed to demonstrate that a high assurance system for smart cards was technically feasible and commercially viable. The entire system has b...
David C. Toll, Paul A. Karger, Elaine R. Palmer, S...
BMCBI
2010
190views more  BMCBI 2010»
13 years 9 months ago
APIS: accurate prediction of hot spots in protein interfaces by combining protrusion index with solvent accessibility
Background: It is well known that most of the binding free energy of protein interaction is contributed by a few key hot spot residues. These residues are crucial for understandin...
Jun-Feng Xia, Xing-Ming Zhao, Jiangning Song, De-S...
DATE
2009
IEEE
120views Hardware» more  DATE 2009»
14 years 3 months ago
Overcoming limitations of the SystemC data introspection
—Today verification, testing and debugging of SystemC models can be applied at an early stage in the design process. To support these techniques gaining required information of ...
Christian Genz, Rolf Drechsler