Sciweavers

933 search results - page 135 / 187
» How compilers and tools differ for embedded systems
Sort
View
CHI
2009
ACM
14 years 9 months ago
Body and mind: a study of avatar personalization in three virtual worlds
An increasingly large number of users connect to virtual worlds on a regular basis to conduct activities ranging from gaming to business meetings. In all these worlds, users proje...
Nicolas Ducheneaut, Ming-Hui Wen, Nicholas Yee, Gr...
IPTPS
2005
Springer
14 years 2 months ago
A Statistical Theory of Chord Under Churn
Most earlier studies of DHTs under churn have either depended on simulations as the primary investigation tool, or on establishing bounds for DHTs to function. In this paper, we pr...
Supriya Krishnamurthy, Sameh El-Ansary, Erik Aurel...
CODES
2008
IEEE
14 years 3 months ago
Intra- and inter-processor hybrid performance modeling for MPSoC architectures
The heterogeneity of modern MPSoC architectures, coupled with the increasing complexity of the applications mapped onto them has recently led to a lot of interest in hybrid perfor...
Frank E. B. Ophelders, Samarjit Chakraborty, Henk ...
GAMESEC
2010
136views Game Theory» more  GAMESEC 2010»
13 years 6 months ago
Effective Multimodel Anomaly Detection Using Cooperative Negotiation
Abstract. Many computer protection tools incorporate learning techniques that build mathematical models to capture the characteristics of system's activity and then check whet...
Alberto Volpatto, Federico Maggi, Stefano Zanero
ICSE
2009
IEEE-ACM
14 years 3 months ago
Automated substring hole analysis
Code coverage is a common measure for quantitatively assessing the quality of software testing. Code coverage indicates the fraction of code that is actually executed by tests in ...
Yoram Adler, Eitan Farchi, Moshe Klausner, Dan Pel...