Sciweavers

269 search results - page 35 / 54
» Comparison of Scenario-Based Software Architecture Evaluatio...
Sort
View
MICCAI
2008
Springer
14 years 10 months ago
Tracking the Swimming Motions of C
Quantitative analysis of the swimming motions of C. elegans worms are of critical importance for many gene-related studies on aging. However no automated methods are currently in u...
Christophe Restif, Dimitris N. Metaxas
DAC
2010
ACM
14 years 19 days ago
Eyecharts: constructive benchmarking of gate sizing heuristics
—Discrete gate sizing is one of the most commonly used, flexible, and powerful techniques for digital circuit optimization. The underlying problem has been proven to be NP-hard ...
Puneet Gupta, Andrew B. Kahng, Amarnath Kasibhatla...
KDD
1998
ACM
181views Data Mining» more  KDD 1998»
14 years 28 days ago
Approaches to Online Learning and Concept Drift for User Identification in Computer Security
The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
Terran Lane, Carla E. Brodley
VLSI
2012
Springer
12 years 4 months ago
A Signature-Based Power Model for MPSoC on FPGA
e technique is based on abstract execution profiles, called event signatures, and it operates at a higher level of abstraction than, for example, commonly used instruction-set sim...
Roberta Piscitelli, Andy D. Pimentel
WSE
2005
IEEE
14 years 2 months ago
A Comprehensive Model for Web Sites Quality
Many of existing criteria for evaluating web sites quality require methods such as heuristic evaluations, or/and empirical usability tests. This paper aims at defining a quality m...
Oreste Signore