Sciweavers

4722 search results - page 64 / 945
» Encoding Program Executions
Sort
View
JCST
2008
114views more  JCST 2008»
13 years 10 months ago
Synthesizing Service Composition Models on the Basis of Temporal Business Rules
Transformational approaches to generating design and implementation models from requirements can bring effectiveness and quality to software development. In this paper we present a...
Jian Yu, Yanbo Han, Jun Han, Yan Jin, Paolo Falcar...
DATE
2009
IEEE
133views Hardware» more  DATE 2009»
14 years 4 months ago
Energy efficient multiprocessor task scheduling under input-dependent variation
— In this paper, we propose a novel, energy aware scheduling algorithm for applications running on DVS-enabled multiprocessor systems, which exploits variation in execution times...
Jason Cong, Karthik Gururaj
DATE
2005
IEEE
162views Hardware» more  DATE 2005»
14 years 3 months ago
A Model-Based Approach for Executable Specifications on Reconfigurable Hardware
UML 2.0 provides a rich set of diagrams for systems documentation and specification. Many efforts have been undertaken to employ different aspects of UML for multiple domains, mai...
Tim Schattkowsky, Wolfgang Müller 0003, Achim...
DATE
2010
IEEE
182views Hardware» more  DATE 2010»
14 years 3 months ago
DAGS: Distribution agnostic sequential Monte Carlo scheme for task execution time estimation
This paper addresses the problem of stochastic task execution time estimation agnostic to the process distributions. The proposed method is orthogonal to the application structure ...
Nabeel Iqbal, M. A. Siddique, Jörg Henkel
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
14 years 10 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof