Sciweavers

1631 search results - page 288 / 327
» Software engineering technology watch
Sort
View
ISMVL
2010
IEEE
209views Hardware» more  ISMVL 2010»
14 years 2 months ago
Secure Design Flow for Asynchronous Multi-valued Logic Circuits
—The purpose of secure devices such as smartcards is to protect secret information against software and hardware attacks. Implementation of the appropriate protection techniques ...
Ashur Rafiev, Julian P. Murphy, Alexandre Yakovlev
CODES
2002
IEEE
14 years 2 months ago
Compiler-directed customization of ASIP cores
This paper presents an automatic method to customize embedded application-specific instruction processors (ASIPs) based on compiler analysis. ASIPs, also known as embedded soft c...
T. Vinod Kumar Gupta, Roberto E. Ko, Rajeev Barua
INCDM
2001
Springer
109views Data Mining» more  INCDM 2001»
14 years 2 months ago
Experience Management: The Fraunhofer IESE Experience Factory
: Experience Management (EM) is an area that is increasingly gaining importance. Its roots lie in Experimental Software Engineering ("Experience Factory"), in Artificial ...
Klaus-Dieter Althoff, Björn Decker, Susanne H...
HICSS
2000
IEEE
133views Biometrics» more  HICSS 2000»
14 years 2 months ago
Value based Requirements Creation for Electronic Commerce Applications
Electronic commerce applications have special features compared to conventional information systems. First, because electronic commerce usually involves yet nonexisting business a...
Jaap Gordijn, Hans Akkermans, Hans van Vliet
SIGIR
2010
ACM
14 years 1 months ago
How good is a span of terms?: exploiting proximity to improve web retrieval
Ranking search results is a fundamental problem in information retrieval. In this paper we explore whether the use of proximity and phrase information can improve web retrieval ac...
Krysta Marie Svore, Pallika H. Kanani, Nazan Khan