Sciweavers

3792 search results - page 662 / 759
» Techniques for Trusted Software Engineering
Sort
View
WWW
2004
ACM
16 years 5 months ago
Accurate, scalable in-network identification of p2p traffic using application signatures
The ability to accurately identify the network traffic associated with different P2P applications is important to a broad range of network operations including application-specifi...
Subhabrata Sen, Oliver Spatscheck, Dongmei Wang
WWW
2007
ACM
16 years 5 months ago
A framework for rapid integration of presentation components
The development of user interfaces (UIs) is one of the most timeconsuming aspects in software development. In this context, the lack of proper reuse mechanisms for UIs is increasi...
Boualem Benatallah, Fabio Casati, Florian Daniel, ...
160
Voted
CHI
2007
ACM
16 years 5 months ago
iStuff mobile: rapidly prototyping new mobile phone interfaces for ubiquitous computing
iStuff Mobile is the first rapid prototyping framework that helps explore new sensor-based interfaces with existing mobile phones. It focuses on sensor-enhanced physical interface...
Rafael Ballagas, Faraz Memon, Rene Reiners, Jan O....
153
Voted
LCTRTS
2009
Springer
15 years 11 months ago
A compiler optimization to reduce soft errors in register files
Register file (RF) is extremely vulnerable to soft errors, and traditional redundancy based schemes to protect the RF are prohibitive not only because RF is often in the timing c...
Jongeun Lee, Aviral Shrivastava
ARCS
2009
Springer
15 years 11 months ago
Improving Memory Subsystem Performance Using ViVA: Virtual Vector Architecture
The disparity between microprocessor clock frequencies and memory latency is a primary reason why many demanding applications run well below peak achievable performance. Software c...
Joseph Gebis, Leonid Oliker, John Shalf, Samuel Wi...