Sciweavers

565 search results - page 19 / 113
» Software Techniques for Improving MPP Bulk-Transfer Performa...
Sort
View
MICRO
2003
IEEE
148views Hardware» more  MICRO 2003»
14 years 2 months ago
Fast Secure Processor for Inhibiting Software Piracy and Tampering
Due to the widespread software piracy and virus attacks, significant efforts have been made to improve security for computer systems. For stand-alone computers, a key observation...
Jun Yang 0002, Youtao Zhang, Lan Gao
HICSS
1999
IEEE
93views Biometrics» more  HICSS 1999»
14 years 1 months ago
The Design of a Letter-Mail Transportation Network by Intelligent Techniques
Many transportation providers such as package delivery companies and postal service organizations face the problem of designing a transportation network in order to service their ...
Hans-Jürgen Sebastian, Tore Grünert, Mic...
METRICS
2002
IEEE
14 years 1 months ago
A Generic Model and Tool Support for Assessing and Improving Web Processes
Process assessment or process improvement is usually not considered in the context of Web applications, and the differences between Web applications and traditional applications a...
Daniel Rodríguez, Rachel Harrison, Manoranj...
GECCO
2008
Springer
172views Optimization» more  GECCO 2008»
13 years 10 months ago
Empirical analysis of a genetic algorithm-based stress test technique
Evolutionary testing denotes the use of evolutionary algorithms, e.g., Genetic Algorithms (GAs), to support various test automation tasks. Since evolutionary algorithms are heuris...
Vahid Garousi
TCAD
2008
114views more  TCAD 2008»
13 years 8 months ago
Word-Level Predicate-Abstraction and Refinement Techniques for Verifying RTL Verilog
el Predicate Abstraction and Refinement Techniques for Verifying RTL Verilog Himanshu Jain, Daniel Kroening, Natasha Sharygina, and Edmund M. Clarke, Fellow, IEEE As a first step, ...
Himanshu Jain, Daniel Kroening, Natasha Sharygina,...