Sciweavers

8623 search results - page 1550 / 1725
» Software engineering for secure systems
Sort
View
CODES
2009
IEEE
14 years 4 months ago
A variation-tolerant scheduler for better than worst-case behavioral synthesis
– There has been a recent shift in design paradigms, with many turning towards yield-driven approaches to synthesize and design systems. A major cause of this shift is the contin...
Jason Cong, Albert Liu, Bin Liu
EUROMICRO
2009
IEEE
14 years 4 months ago
Exercise Generation by Group Models for Autonomous Web-Based Learning
Abstract— Creating exercises for learners requires significant time. This is one reason, beside difficulties of discussing individualized tasks in a classroom setting, why often ...
Michael Sonntag
ARCS
2009
Springer
14 years 4 months ago
Hybrid Resource Discovery Mechanism in Ad Hoc Grid Using Structured Overlay
Resource management has been an area of research in ad hoc grids for many years. Recently, different research projects have focused resource management in centralized, decentralize...
Tariq Abdullah, Luc Onana Alima, Vassiliy Sokolov,...
GECCO
2009
Springer
166views Optimization» more  GECCO 2009»
14 years 4 months ago
Genetic programming in the wild: evolving unrestricted bytecode
We describe a methodology for evolving Java bytecode, enabling the evolution of extant, unrestricted Java programs, or programs in other languages that compile to Java bytecode. B...
Michael Orlov, Moshe Sipper
CODES
2007
IEEE
14 years 4 months ago
Locality optimization in wireless applications
There is a strong need now for compilers of embedded systems to find effective ways of optimizing series of loop-nests, wherein majority of the memory references occur in the fo...
Javed Absar, Min Li, Praveen Raghavan, Andy Lambre...
« Prev « First page 1550 / 1725 Last » Next »