Sciweavers

2116 search results - page 172 / 424
» Resource Analysis by Sup-interpretation
Sort
View
DATE
2004
IEEE
114views Hardware» more  DATE 2004»
15 years 7 months ago
Workload Characterization Model for Tasks with Variable Execution Demand
The analysis of real-time properties of an embedded system usually relies on the worst-case execution times (WCET) of the tasks to be executed. In contrast to that, in real world ...
Alexander Maxiaguine, Simon Künzli, Lothar Th...
DMIN
2006
113views Data Mining» more  DMIN 2006»
15 years 5 months ago
Back-propagation DEA
Data Envelopment Analysis (DEA) is one of the most widely used methods in the measurement efficiency and productivity of Decision Making Units (DMUs). DEA for a large dataset with...
Ali Emrouznejad
IADIS
2003
15 years 5 months ago
Improving Internet Research Methods: A Web Laboratory
We describe the current state of a resource that enables research in the human sciences with differential access rights for experimenters and participants in experiments. We outli...
Maria Buckley, Carl Vogel
BIB
2006
150views more  BIB 2006»
15 years 4 months ago
Open source tools and toolkits for bioinformatics: significance, and where are we?
This review summarizes important work in open-source bioinformatics software that has occurred over the past couple of years. The survey is intended to illustrate how programs and...
Jason E. Stajich, Hilmar Lapp
ADHOC
2005
134views more  ADHOC 2005»
15 years 4 months ago
How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols
This paper presents a systematic analysis of insider attacks against mobile ad-hoc routing protocols, using the Ad hoc On-Demand Distance Vector (AODV) protocol as an example. It ...
Peng Ning, Kun Sun