Sciweavers

4987 search results - page 839 / 998
» Fuzzifying P Systems
Sort
View
143
Voted
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
15 years 11 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo
IEEEPACT
2008
IEEE
15 years 11 months ago
A tuning framework for software-managed memory hierarchies
Achieving good performance on a modern machine with a multi-level memory hierarchy, and in particular on a machine with software-managed memories, requires precise tuning of progr...
Manman Ren, Ji Young Park, Mike Houston, Alex Aike...
ISPASS
2008
IEEE
15 years 11 months ago
Independent Component Analysis and Evolutionary Algorithms for Building Representative Benchmark Subsets
— This work addresses the problem of building representative subsets of benchmarks from an original large set of benchmarks, using statistical analysis techniques. The subsets sh...
Vassilios N. Christopoulos, David J. Lilja, Paul R...
IWPC
2008
IEEE
15 years 11 months ago
Reusing Program Investigation Knowledge for Code Understanding
Software maintenance tasks typically involve an important amount of program investigation effort on the part of software developers. To what extent can we benefit from prior prog...
Martin P. Robillard, Putra Manggala
PDP
2008
IEEE
15 years 11 months ago
Routing Performance in a Hierarchical DHT-based Overlay Network
The scalability properties of DHT based overlay networks is considered satisfactory. However, in large scale systems this might still cause a problem since they have a logarithmic...
Isaías Martinez-Yelmo, Rubén Cuevas ...