Sciweavers

12551 search results - page 2256 / 2511
» Reuse in Systems Engineering
Sort
View
120
Voted
CODES
2009
IEEE
15 years 11 months ago
A variation-tolerant scheduler for better than worst-case behavioral synthesis
– There has been a recent shift in design paradigms, with many turning towards yield-driven approaches to synthesize and design systems. A major cause of this shift is the contin...
Jason Cong, Albert Liu, Bin Liu
136
Voted
CSE
2009
IEEE
15 years 11 months ago
Social Inference Risk Modeling in Mobile and Social Applications
— The emphasis of emerging mobile and Web 2.0 applications on collaboration and communication increases threats to user privacy. A serious, yet under-researched privacy risk resu...
Sara Motahari, Sotirios G. Ziavras, Mor Naaman, Mo...
CSE
2009
IEEE
15 years 11 months ago
Security Implications of Virtualization: A Literature Study
— Data centers accumulate corporate and personal data at a rapid pace. Driven by economy of scale and the high bandwidth of today’s network connections, more and more businesse...
André van Cleeff, Wolter Pieters, Roel Wier...
CSE
2009
IEEE
15 years 11 months ago
Davis Social Links or: How I Learned to Stop Worrying and Love the Net
—When the Internet was conceived, its fundamental operation was envisioned to be point-to-point communication allowing anybody to talk directly to anybody. With its increasing su...
Matt Spear, Xiaoming Lu, Shyhtsun Felix Wu
CSE
2009
IEEE
15 years 11 months ago
A Semantic Imitation Model of Social Tag Choices
—We describe a semantic imitation model of social tagging that integrates formal representations of semantics and a stochastic tag choice process to explain and predict emergent ...
Wai-Tat Fu, Thomas George Kannampallil, Ruogu Kang
« Prev « First page 2256 / 2511 Last » Next »