Sciweavers

3511 search results - page 676 / 703
» Evaluation Methods for Groupware Systems
Sort
View
ENTCS
2007
108views more  ENTCS 2007»
13 years 8 months ago
Generating Java Compiler Optimizers Using Bidirectional CTL
There have been several research works that analyze and optimize programs using temporal logic. However, no evaluation of optimization time or execution time of these implementati...
Ling Fang, Masataka Sassa
SIGARCH
2008
97views more  SIGARCH 2008»
13 years 8 months ago
SP-NUCA: a cost effective dynamic non-uniform cache architecture
1 This paper presents a simple but effective method to reduce on-chip access latency and improve core isolation in CMP Non-Uniform Cache Architectures (NUCA). The paper introduces ...
Javier Merino, Valentin Puente, Pablo Prieto, Jos&...
TOPLAS
2008
138views more  TOPLAS 2008»
13 years 8 months ago
Decomposing bytecode verification by abstract interpretation
act Interpretation C. BERNARDESCHI, N. DE FRANCESCO, G. LETTIERI, L. MARTINI, and P. MASCI Universit`a di Pisa Bytecode verification is a key point in the security chain of the Jav...
Cinzia Bernardeschi, Nicoletta De Francesco, Giuse...
BMCBI
2002
119views more  BMCBI 2002»
13 years 7 months ago
Microarray results: how accurate are they?
Background: DNA microarray technology is a powerful technique that was recently developed in order to analyze thousands of genes in a short time. Presently, microarrays, or chips,...
Ravi Kothapalli, Sean J. Yoder, Shrikant Mane, Tho...
AAMAS
1999
Springer
13 years 7 months ago
Fully Embodied Conversational Avatars: Making Communicative Behaviors Autonomous
: Although avatars may resemble communicative interface agents, they have for the most part not profited from recent research into autonomous embodied conversational systems. In pa...
Justine Cassell, Hannes Högni Vilhjálm...