Sciweavers

641 search results - page 28 / 129
» Identifying Contingency Requirements Using Obstacle Analysis
Sort
View
SAC
2008
ACM
13 years 7 months ago
Removing useless variables in cost analysis of Java bytecode
Automatic cost analysis has interesting applications in the context of verification and certification of mobile code. For instance, the code receiver can use cost information in o...
Elvira Albert, Puri Arenas, Samir Genaim, Germ&aac...
SETP
2007
13 years 9 months ago
Dimensional Inference Using Symbol Lives
Scientific equations embedded in computer programs must obey the rules for dimensional consistency. Many efforts have been made to enforce these rules within computer programs. So...
Brian Farrimond, John Collins
ISCA
1995
IEEE
121views Hardware» more  ISCA 1995»
13 years 11 months ago
A Comparative Analysis of Schemes for Correlated Branch Prediction
Modern high-performance architectures require extremely accurate branch prediction to overcome the performance limitations of conditional branches. We present a framework that cat...
Cliff Young, Nicholas C. Gloy, Michael D. Smith
AUSDM
2006
Springer
124views Data Mining» more  AUSDM 2006»
13 years 11 months ago
Analyzing Harmonic Monitoring Data Using Data Mining
Harmonic monitoring has become an important tool for harmonic management in distribution systems. A comprehensive harmonic monitoring program has been designed and implemented on ...
Ali Asheibi, David Stirling, Danny Soetanto
TIM
2011
172views more  TIM 2011»
13 years 2 months ago
Selecting a Reference High Resolution for Fingerprint Recognition Using Minutiae and Pores
—High-resolution automated fingerprint recognition systems (AFRSs) offer higher security because they are able to make use of level-3 features, such as pores, that are not avail...
David Zhang, Feng Liu, Qijun Zhao, Guangming Lu, N...