Sciweavers

702 search results - page 124 / 141
» Implementing software product lines using traits
Sort
View
SIGCSE
2010
ACM
181views Education» more  SIGCSE 2010»
14 years 2 months ago
Teaching the principles of the hacker curriculum to undergraduates
The “Hacker Curriculum” exists as a mostly undocumented set of principles and methods for learning about information security. Hacking, in our view, is defined by the ability...
Sergey Bratus, Anna Shubina, Michael E. Locasto
VTS
2005
IEEE
162views Hardware» more  VTS 2005»
14 years 1 months ago
Low-Cost Alternate EVM Test for Wireless Receiver Systems
† In digital radio applications, error-vector-magnitude (EVM) is the primary specification which quantifies the performance of digital modulation implemented in silicon. Producti...
Achintya Halder, Abhijit Chatterjee
HIPC
2004
Springer
14 years 1 months ago
Parallel Performance of Hierarchical Multipole Algorithms for Inductance Extraction
Parasitic extraction techniques are used to estimate signal delay in VLSI chips. Inductance extraction is a critical component of the parasitic extraction process in which on-chip ...
Hemant Mahawar, Vivek Sarin, Ananth Grama
DIAGRAMS
2008
Springer
13 years 9 months ago
General Euler Diagram Generation
Euler diagrams are a natural method of representing set-theoretic data and have been employed in diverse areas such as visualizing statistical data, as a basis for diagrammatic log...
Peter Rodgers, Leishi Zhang, Andrew Fish
ITNG
2010
IEEE
13 years 6 months ago
Towards Adaptive Replication Reconfiguration for QoS
— Replication is a technique widely used for large networked software systems to provide qualities such as reliability, availability, performance and scalability to their clients...
Raihan Al-Ekram, Richard C. Holt