Sciweavers

157 search results - page 22 / 32
» Extending Symmetry Reduction by Exploiting System Architectu...
Sort
View
SIGSOFT
2005
ACM
14 years 1 months ago
Reuse and variability in large software applications
Reuse has always been a major goal in software engineering, since it promises large gains in productivity, quality and time to market reduction. Practical experience has shown tha...
Jacky Estublier, Germán Vega
USS
2004
13 years 9 months ago
Graphical Dictionaries and the Memorable Space of Graphical Passwords
In commonplace textual password schemes, users choose passwords that are easy to recall. Since memorable passwords typically exhibit patterns, they are exploitable by brute-force ...
Julie Thorpe, Paul C. van Oorschot
MOBILWARE
2009
ACM
14 years 2 months ago
Middleware Solutions for Self-organizing Multi-hop Multi-path Internet Connectivity Based on Bluetooth
The availability of heterogeneous wireless interfaces and of growing computing resources on widespread portable devices pushes for enabling innovative deployment scenarios where mo...
Paolo Bellavista, Carlo Giannelli
MICRO
2010
IEEE
111views Hardware» more  MICRO 2010»
13 years 2 months ago
Putting Faulty Cores to Work
Since the non-cache parts of a core are less regular, compared to on-chip caches, tolerating manufacturing defects in the processing core is a more challenging problem. Due to the ...
Amin Ansari, Shuguang Feng, Shantanu Gupta, Scott ...
GECCO
2003
Springer
182views Optimization» more  GECCO 2003»
14 years 28 days ago
Spatial Operators for Evolving Dynamic Bayesian Networks from Spatio-temporal Data
Learning Bayesian networks from data has been studied extensively in the evolutionary algorithm communities [Larranaga96, Wong99]. We have previously explored extending some of the...
Allan Tucker, Xiaohui Liu, David Garway-Heath