Sciweavers

927 search results - page 111 / 186
» Practical Limits on Software Dependability: A Case Study
Sort
View
KAIS
2007
112views more  KAIS 2007»
13 years 7 months ago
The pairwise attribute noise detection algorithm
Analyzing the quality of data prior to constructing data mining models is emerging as an important issue. Algorithms for identifying noise in a given data set can provide a good me...
Jason Van Hulse, Taghi M. Khoshgoftaar, Haiying Hu...
JNCA
2010
106views more  JNCA 2010»
13 years 6 months ago
A methodology for engineering collaborative and ad-hoc mobile applications using SyD middleware
Today’s web applications are more collaborative and are using the standard and ubiquitous Internet protocols. We have earlier developed System on Mobile Devices (SyD) middleware...
Praveen Madiraju, Srilaxmi Malladi, Janaka Balasoo...
TVLSI
2002
97views more  TVLSI 2002»
13 years 7 months ago
Techniques for energy-efficient communication pipeline design
The performance of many modern computer and communication systems is dictated by the latency of communication pipelines. At the same time, power/energy consumption is often another...
Gang Qu, Miodrag Potkonjak
CNSR
2005
IEEE
14 years 1 months ago
Third-Party Flow Control
Flow control is critical to the efficient operation of Internet Service Providers network equipment. In particular, the ability to effectively shape traffic can reduce cost and ...
Dushyant Bansal, Paul A. S. Ward
FMSD
2007
133views more  FMSD 2007»
13 years 7 months ago
Static priority scheduling of event-triggered real-time embedded systems
Real-time embedded systems are often specified as a collection of independent tasks, each generating a sequence of event-triggered code blocks, and the scheduling in this domain ...
Cagkan Erbas, Andy D. Pimentel, Selin Cerav-Erbas