Sciweavers

1063 search results - page 75 / 213
» Programming Methodologies in GCLA
Sort
View
ASPLOS
2010
ACM
14 years 2 months ago
Characterizing processor thermal behavior
Temperature is a dominant factor in the performance, reliability, and leakage power consumption of modern processors. As a result, increasing numbers of researchers evaluate therm...
Francisco J. Mesa-Martinez, Ehsan K. Ardestani, Jo...
GECCO
2005
Springer
14 years 1 months ago
Evaluating GP schema in context
We propose a new methodology to look at the fitness contributions (semantics) of different schemata in Genetic Programming (GP). We hypothesize that the significance of a schem...
Hammad Majeed, Conor Ryan, R. Muhammad Atif Azad
RE
2005
Springer
14 years 1 months ago
Reverse Engineering Goal Models from Legacy Code
A reverse engineering process aims at reconstructing el abstractions from source code. This paper presents a novel reverse engineering methodology for recovering stakeholder goal ...
Yijun Yu, Yiqiao Wang, John Mylopoulos, Sotirios L...
INFOCOM
2003
IEEE
14 years 1 months ago
Modeling Malware Spreading Dynamics
— In this paper we present analytical techniques that can be used to better understand the behavior of malware, a generic term that refers to all kinds of malicious software prog...
Michele Garetto, Weibo Gong, Donald F. Towsley
EOR
2002
165views more  EOR 2002»
13 years 7 months ago
Review of ranking methods in the data envelopment analysis context
Within data envelopment analysis (DEA) is a sub-group of papers in which many researchers have sought to improve the differential capabilities of DEA and to fully rank both effici...
Nicole Adler, Lea Friedman, Zilla Sinuany-Stern