Sciweavers

2513 search results - page 456 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
LCTRTS
2005
Springer
14 years 3 months ago
Cache aware optimization of stream programs
Effective use of the memory hierarchy is critical for achieving high performance on embedded systems. We focus on the class of streaming applications, which is increasingly preval...
Janis Sermulins, William Thies, Rodric M. Rabbah, ...
IUI
2004
ACM
14 years 3 months ago
Sheepdog: learning procedures for technical support
Technical support procedures are typically very complex. Users often have trouble following printed instructions describing how to perform these procedures, and these instructions...
Tessa A. Lau, Lawrence D. Bergman, Vittorio Castel...
KIVS
1999
Springer
14 years 2 months ago
Mobile Agents as an Architectural Concept for Internet-Based Distributed Applications - The WASP Project Approach
Abstract. After introducing the concept of mobile agents and potential application domains, we motivate why mobile agent technology is an interesting concept for large Internet-bas...
Stefan Fünfrocken, Friedemann Mattern
ASPLOS
1992
ACM
14 years 2 months ago
Parity Declustering for Continuous Operation in Redundant Disk Arrays
We describe and evaluate a strategy for declustering the parity encoding in a redundant disk array. This declustered parity organization balances cost against data reliability and...
Mark Holland, Garth A. Gibson
CSB
2004
IEEE
131views Bioinformatics» more  CSB 2004»
14 years 1 months ago
Improved Fourier Transform Method for Unsupervised Cell-Cycle Regulated Gene Prediction
Motivation: Cell-cycle regulated gene prediction using microarray time-course measurements of the mRNA expression levels of genes has been used by several researchers. The popular...
Karuturi R. Krishna Murthy, Liu Jian Hua