Sciweavers

4126 search results - page 712 / 826
» Set based logic programming
Sort
View
HPCA
2007
IEEE
14 years 10 months ago
Exploiting Postdominance for Speculative Parallelization
Task-selection policies are critical to the performance of any architecture that uses speculation to extract parallel tasks from a sequential thread. This paper demonstrates that ...
Mayank Agarwal, Kshitiz Malik, Kevin M. Woley, Sam...
CSMR
2009
IEEE
14 years 4 months ago
Identification of Extract Method Refactoring Opportunities
Extract Method has been recognized as one of the most important refactorings, since it decomposes large methods and can be used in combination with other refactorings for fixing a...
Nikolaos Tsantalis, Alexander Chatzigeorgiou
ER
2009
Springer
92views Database» more  ER 2009»
14 years 4 months ago
From User Goals to Service Discovery and Composition
Goals are often used to represent stakeholder’s objectives. The intentionality inherited by a goal drives stakeholders to pursuit the fulfillment of their goals either by themse...
Luiz Olavo Bonino da Silva Santos, Giancarlo Guizz...
CDC
2008
IEEE
145views Control Systems» more  CDC 2008»
14 years 4 months ago
Parameter estimation with expected and residual-at-risk criteria
In this paper we study a class of uncertain linear estimation problems in which the data are affected by random uncertainty. In this setting, we consider two estimation criteria,...
Giuseppe Carlo Calafiore, Ufuk Topcu, Laurent El G...
SP
2008
IEEE
117views Security Privacy» more  SP 2008»
14 years 4 months ago
Anonymous Networking with Minimum Latency in Multihop Networks
The problem of security against timing based traffic analysis in multihop networks is considered in this work. In particular, the relationship between the level of anonymity prov...
Parvathinathan Venkitasubramaniam, Lang Tong