Sciweavers

8503 search results - page 1627 / 1701
» Secure Software Architectures
Sort
View
128
Voted
PLDI
2003
ACM
15 years 8 months ago
Linear analysis and optimization of stream programs
As more complex DSP algorithms are realized in practice, an increasing need for high-level stream abstractions that can be compiled without sacrificing efficiency. Toward this en...
Andrew A. Lamb, William Thies, Saman P. Amarasingh...
120
Voted
SENSYS
2003
ACM
15 years 8 months ago
Bandwidth management in wireless sensor networks
Wireless sensor networks are often used in monitoring and control applications, where software running on generalpurpose computers “pull” information from remote sensors and ...
Bret Hull, Kyle Jamieson, Hari Balakrishnan
SAC
2009
ACM
15 years 7 months ago
Towards "WYDIWYS" for MIMI using concept analysis
This paper presents a novel software engineering approach for developing a dynamic web interface that meets the quality criterion of “WYDIWYS” - What You Do Is What You See. T...
Jie Dai, Remo Mueller, Jacek Szymanski, Guo-Qiang ...
115
Voted
CIKM
2009
Springer
15 years 7 months ago
Low-cost management of inverted files for online full-text search
In dynamic environments with frequent content updates, we require online full-text search that scales to large data collections and achieves low search latency. Several recent met...
Giorgos Margaritis, Stergios V. Anastasiadis
125
Voted
LCPC
2009
Springer
15 years 7 months ago
Speculative Optimizations for Parallel Programs on Multicores
The advent of multicores presents a promising opportunity for exploiting fine grained parallelism present in programs. Programs parallelized in the above fashion, typically involv...
Vijay Nagarajan, Rajiv Gupta
« Prev « First page 1627 / 1701 Last » Next »