Sciweavers

1479 search results - page 100 / 296
» Extremal collective behavior
Sort
View
CAV
2007
Springer
121views Hardware» more  CAV 2007»
15 years 10 months ago
Low-Level Library Analysis and Summarization
Programs typically make extensive use of libraries, including dynamically linked libraries, which are often not available in source-code form, and hence not analyzable by tools tha...
Denis Gopan, Thomas W. Reps
ESORICS
2007
Springer
15 years 10 months ago
Completeness of the Authentication Tests
Protocol participants manipulate values, transforming the cryptographic contexts in which they occur. The rules of the protocol determine which transformations are permitted. We fo...
Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Th...
DATE
2006
IEEE
93views Hardware» more  DATE 2006»
15 years 10 months ago
Software annotations for power optimization on mobile devices
Modern applications for mobile devices, such as multimedia video/audio, often exhibit a common behavior: they process streams of incoming data in a regular, predictable way. The r...
Radu Cornea, Alexandru Nicolau, Nikil D. Dutt
CW
2003
IEEE
15 years 9 months ago
Webspace Surfing Patterns and Their Impact on Web Prefetching
The paper presents an interesting study that how the user surfing behavior with respect to the organization of a web space affects the performance of a prefetch enabled proxy. We ...
Javed I. Khan, Qingping Tao
WECWIS
2002
IEEE
131views ECommerce» more  WECWIS 2002»
15 years 9 months ago
Mining Client-Side Activity for Personalization
“Garbage in. garbage out” is a well-known phrase in computer analysis, and one that comes to mind when mining Web data to draw conclusions about Web users. The challenge is th...
Kurt D. Fenstermacher, Mark Ginsburg