Sciweavers

5843 search results - page 1063 / 1169
» Software Security in Practice
Sort
View
SIGIR
2010
ACM
13 years 5 months ago
PRES: a score metric for evaluating recall-oriented information retrieval applications
Information retrieval (IR) evaluation scores are generally designed to measure the effectiveness with which relevant documents are identified and retrieved. Many scores have been ...
Walid Magdy, Gareth J. F. Jones
TC
2010
13 years 4 months ago
Scheduling Concurrent Bag-of-Tasks Applications on Heterogeneous Platforms
Abstract-- Scheduling problems are already difficult on traditional parallel machines, and they become extremely challenging on heterogeneous clusters. In this paper we deal with t...
Anne Benoit, Loris Marchal, Jean-Francois Pineau, ...
TCAD
2010
168views more  TCAD 2010»
13 years 4 months ago
An MILP-Based Performance Analysis Technique for Non-Preemptive Multitasking MPSoC
For real-time applications, it is necessary to estimate the worst-case performance early in the design process without actual hardware implementation. While the non-preemptive task...
Hoeseok Yang, Sungchan Kim, Soonhoi Ha
TCAD
2010
116views more  TCAD 2010»
13 years 4 months ago
MeshWorks: A Comprehensive Framework for Optimized Clock Mesh Network Synthesis
Clock mesh networks are well known for their variation tolerance. But their usage is limited to high-end designs due to the significantly high resource requirements compared to clo...
Anand Rajaram, David Z. Pan
TCOM
2010
98views more  TCOM 2010»
13 years 4 months ago
Convolutionally Coded Transmission over Markov-Gaussian Channels: Analysis and Decoding Metrics
It has been widely acknowledged that the aggregate interference at the receiver for various practical communication channels can often deviate markedly from the classical additive ...
Jeebak Mitra, Lutz H.-J. Lampe
« Prev « First page 1063 / 1169 Last » Next »