Sciweavers

1763 search results - page 315 / 353
» Methodologies for Web Information System Design
Sort
View
IMCS
2007
78views more  IMCS 2007»
13 years 10 months ago
Usable set-up of runtime security policies
Setting up runtime security policies as required for firewalls or as envisioned by policy languages for the Semantic Web is a difficult task, especially for lay users who have l...
Almut Herzog, Nahid Shahmehri
CHI
2011
ACM
13 years 2 months ago
Modern software product support processes and the usage of multimedia formats
Despite being an important channel for end-user assistance, few studies have directly investigated the interactions that occur in modern-day practice of software product support. ...
Parmit K. Chilana, Tovi Grossman, George W. Fitzma...
DAC
2010
ACM
14 years 2 months ago
Off-chip memory bandwidth minimization through cache partitioning for multi-core platforms
We present a methodology for off-chip memory bandwidth minimization through application-driven L2 cache partitioning in multicore systems. A major challenge with multi-core system...
Chenjie Yu, Peter Petrov
ICS
2004
Tsinghua U.
14 years 3 months ago
EXPERT: expedited simulation exploiting program behavior repetition
Studying program behavior is a central component in architectural designs. In this paper, we study and exploit one aspect of program behavior, the behavior repetition, to expedite...
Wei Liu, Michael C. Huang
ICCD
1995
IEEE
109views Hardware» more  ICCD 1995»
14 years 1 months ago
Verifying the performance of the PCI local bus using symbolic techniques
Symbolic model checking is a successful technique for checking properties of large finite-state systems. This method has been used to verify a number of real-world hardware desig...
Sérgio Vale Aguiar Campos, Edmund M. Clarke...