Sciweavers

645 search results - page 101 / 129
» Performance Modeling and Analysis of Context-Aware Mobile So...
Sort
View
IISWC
2008
IEEE
14 years 2 months ago
On the representativeness of embedded Java benchmarks
— Java has become one of the predominant languages for embedded and mobile platforms due to its architecturally neutral design, portability, and security. But Java execution in t...
Ciji Isen, Lizy Kurian John, Jung Pil Choi, Hyo Ju...
VOTEID
2007
Springer
14 years 2 months ago
Assessing Procedural Risks and Threats in e-Voting: Challenges and an Approach
Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats m...
Komminist Weldemariam, Adolfo Villafiorita, Andrea...
MR
2007
157views Robotics» more  MR 2007»
13 years 7 months ago
Electronic prognostics - A case study using global positioning system (GPS)
– Prognostic health management (PHM) of electronic systems presents challenges traditionally viewed as either insurmountable or otherwise not worth the cost of pursuit. Recent ch...
Douglas W. Brown, Patrick W. Kalgren, Carl S. Byin...
SIGIR
2008
ACM
13 years 7 months ago
A few examples go a long way: constructing query models from elaborate query formulations
We address a specific enterprise document search scenario, where the information need is expressed in an elaborate manner. In our scenario, information needs are expressed using a...
Krisztian Balog, Wouter Weerkamp, Maarten de Rijke
CSMR
1999
IEEE
14 years 6 days ago
Impact of Function Pointers on the Call Graph
Maintenance activities are made more difficult when pointers are heavily used in source code: the programmer needs to build a mental model of memory locations and of the way they ...
Giuliano Antoniol, F. Calzolari, Paolo Tonella