Sciweavers

105 search results - page 17 / 21
» Discouraging Software Piracy Using Software Aging
Sort
View
COMPSAC
2002
IEEE
14 years 1 months ago
Dependency Analysis and Visualization as Tools to Prolong System Life
This paper describes our experience using dependency analysis and visualization as a tool to identify intervention points for migrating applications to environments where they can...
Dave McComb, Simon Robe, Simon Hoare, Stew Crawfor...
COMSWARE
2007
IEEE
14 years 3 months ago
Impact of Network Dynamics on Tardiness of Data in Sensor Networks
- Impact of random delays and losses in sensor networks manifests in the form of tardiness of data used for processing at the sink nodes. The age of data used by the end applicatio...
Tarun Banka, Anura P. Jayasumana
EL
2010
172views more  EL 2010»
13 years 7 months ago
Computer literacy skills of librarians: a case study of Isfahan University libraries, Iran
We live in a computer-centric information age. The number of computers in-use including in libraries is growing rapidly. Computer literacy, which is the ability to operate a compu...
Hajar Safahieh, Asefeh Asemi
SISW
2003
IEEE
14 years 2 months ago
Memories: A Survey of Their Secure Uses in Smart Cards
— Smart cards are widely known for their tamper resistance, but only contain a small amount of memory. Though very small, this memory often contains highly valuable information (...
Michael Neve, Eric Peeters, David Samyde, Jean-Jac...
PPOPP
2010
ACM
14 years 6 months ago
Scaling LAPACK panel operations using parallel cache assignment
In LAPACK many matrix operations are cast as block algorithms which iteratively process a panel using an unblocked algorithm and then update a remainder matrix using the high perf...
Anthony M. Castaldo, R. Clint Whaley