Sciweavers

269 search results - page 35 / 54
» Comparison of Scenario-Based Software Architecture Evaluatio...
Sort
View
MICCAI
2008
Springer
16 years 4 months ago
Tracking the Swimming Motions of C
Quantitative analysis of the swimming motions of C. elegans worms are of critical importance for many gene-related studies on aging. However no automated methods are currently in u...
Christophe Restif, Dimitris N. Metaxas
137
Voted
DAC
2010
ACM
15 years 7 months ago
Eyecharts: constructive benchmarking of gate sizing heuristics
—Discrete gate sizing is one of the most commonly used, flexible, and powerful techniques for digital circuit optimization. The underlying problem has been proven to be NP-hard ...
Puneet Gupta, Andrew B. Kahng, Amarnath Kasibhatla...
KDD
1998
ACM
181views Data Mining» more  KDD 1998»
15 years 8 months ago
Approaches to Online Learning and Concept Drift for User Identification in Computer Security
The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
Terran Lane, Carla E. Brodley
255
Voted
VLSI
2012
Springer
13 years 11 months ago
A Signature-Based Power Model for MPSoC on FPGA
e technique is based on abstract execution profiles, called event signatures, and it operates at a higher level of abstraction than, for example, commonly used instruction-set sim...
Roberta Piscitelli, Andy D. Pimentel
165
Voted
WSE
2005
IEEE
15 years 9 months ago
A Comprehensive Model for Web Sites Quality
Many of existing criteria for evaluating web sites quality require methods such as heuristic evaluations, or/and empirical usability tests. This paper aims at defining a quality m...
Oreste Signore