Sciweavers

10828 search results - page 2005 / 2166
» Improving the application of process models
Sort
View
188
Voted
ICTAI
2008
IEEE
15 years 11 months ago
Discovering Program's Behavioral Patterns by Inferring Graph-Grammars from Execution Traces
Frequent patterns in program executions represent recurring sequences of events. These patterns can be used to reveal the hidden structures of a program, and ease the comprehensio...
Chunying Zhao, Keven Ates, Jun Kong, Kang Zhang
IEEEPACT
2008
IEEE
15 years 11 months ago
A tuning framework for software-managed memory hierarchies
Achieving good performance on a modern machine with a multi-level memory hierarchy, and in particular on a machine with software-managed memories, requires precise tuning of progr...
Manman Ren, Ji Young Park, Mike Houston, Alex Aike...
ISCAS
2008
IEEE
129views Hardware» more  ISCAS 2008»
15 years 11 months ago
Physical unclonable function with tristate buffers
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
Erdinç Öztürk, Ghaith Hammouri, B...
GLOBECOM
2007
IEEE
15 years 11 months ago
Uncertainty Mitigation for Utility-Oriented Routing in Wireless Ad Hoc Networks
— Link and node reliability are important metrics in wireless ad hoc networks. Therefore, evaluating and quantifying reliability has become the cornerstone of research in this ...
Feng Li, Avinash Srinivasan, Mingming Lu, Jie Wu
HASE
2007
IEEE
15 years 11 months ago
A Fault Taxonomy for Service-Oriented Architecture
—Service-Oriented Architecture (SOA) is a popular design paradigm for distributed systems today. Its dynamics and loose coupling are predestined for self-adaptive systems. This a...
Stefan Brüning, Stephan Weißleder, Miro...
« Prev « First page 2005 / 2166 Last » Next »