Sciweavers

1720 search results - page 280 / 344
» Evaluation of a High Performance Code Compression Method
Sort
View
118
Voted
APSEC
2008
IEEE
15 years 9 months ago
Test Case Prioritization Based on Analysis of Program Structure
Test case prioritization techniques have been empirically proved to be effective in improving the rate of fault detection in regression testing. However, most of previous techniqu...
Zengkai Ma, Jianjun Zhao
157
Voted
ACMACE
2008
ACM
15 years 4 months ago
BeatBender: subsumption architecture for autonomous rhythm generation
BeatBender is a computer music project that explores a new method for generating emergent rhythmic drum patterns using the subsumption architecture. Rather than explicitly coding ...
Aaron Levisohn, Philippe Pasquier
114
Voted
CF
2005
ACM
15 years 4 months ago
Reducing misspeculation overhead for module-level speculative execution
Thread-level speculative execution is a technique that makes it possible for a wider range of single-threaded applications to make use of the processing resources in a chip multip...
Fredrik Warg, Per Stenström
128
Voted
ACSW
2007
15 years 4 months ago
An Automated System for Conversion of Clinical Notes into SNOMED Clinical Terminology
The automatic conversion of free text into a medical ontology can allow computational access to important information currently locked within clinical notes and patient reports. T...
Jon Patrick, Yefeng Wang, Peter Budd
122
Voted
SP
2002
IEEE
140views Security Privacy» more  SP 2002»
15 years 2 months ago
Efficient Multicast Packet Authentication Using Signature Amortization
We describe a novel method for authenticating multicast packets that is robust against packet loss. Our main focus is to minimize the size of the communication overhead required t...
Jung Min Park, Edwin K. P. Chong, Howard Jay Siege...