Sciweavers

2015 search results - page 365 / 403
» Hidden Software Capabilities
Sort
View
CGO
2003
IEEE
13 years 11 months ago
Optimal and Efficient Speculation-Based Partial Redundancy Elimination
Existing profile-guided partial redundancy elimination (PRE) methods use speculation to enable the removal of partial redundancies along more frequently executed paths at the expe...
Qiong Cai, Jingling Xue
AVI
2008
13 years 10 months ago
Adapting a single-user, single-display molecular visualization application for use in a multi-user, multi-display environment
In this paper, we discuss the adaptation of an open-source single-user, single-display molecular visualization application for use in a multi-display, multi-user environment. Jmol...
Clifton Forlines, Ryan H. Lilien
ACMSE
2005
ACM
13 years 9 months ago
Generative approaches for application tailoring of mobile devices
The popularity of mobile devices has propelled the development of many useful location-aware applications. However, the heterogeneity of mobile devices necessitates that the softw...
Victoria Davis, Jeff Gray, Joel Jones
FASE
2008
Springer
13 years 9 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
CIDR
2007
208views Algorithms» more  CIDR 2007»
13 years 9 months ago
Impliance: A Next Generation Information Management Appliance
Though database technology has been remarkably successful in building a large market and adapting to the changes of the last three decades, its impact on the broader market of inf...
Bishwaranjan Bhattacharjee, Joseph S. Glider, Rich...