Sciweavers

861 search results - page 75 / 173
» Predicting Attack-prone Components
Sort
View

Book
1497views
15 years 8 months ago
How to Think Like a Computer Scientist: C++ Version
"The goal of this book is to teach you to think like a computer scientist. I like the way computer scientists think because they combine some of the best features of Mathemati...
Allen B. Downey
DAC
2001
ACM
14 years 11 months ago
JouleTrack - A Web Based Tool for Software Energy Profiling
A software energy estimation methodology is presented that avoids explicit characterization of instruction energy consumption and predicts energy consumption to within 3% accuracy...
Amit Sinha, Anantha Chandrakasan
IWPC
2009
IEEE
14 years 5 months ago
Vector space analysis of software clones
In this paper, we introduce a technique for applying Independent Component Analysis to vector space representations of software code fragments such as methods or blocks. The dista...
Scott Grant, James R. Cordy
GLVLSI
1999
IEEE
120views VLSI» more  GLVLSI 1999»
14 years 3 months ago
Adaptive Hard Disk Power Management on Personal Computers
Dynamic power management can be effective for designing low-power systems. In many systems, requests are clustered into sessions. This paper proposes an adaptive algorithm that ca...
Yung-Hsiang Lu, Giovanni De Micheli
CLOUDCOM
2009
Springer
14 years 2 months ago
SPECI, a Simulation Tool Exploring Cloud-Scale Data Centres
There is a rapid increase in the size of data centres (DCs) used to provide cloud computing services. It is commonly agreed that not all properties in the middleware that manages D...
Ilango Sriram