Sciweavers

859 search results - page 94 / 172
» The Changing Face of Cryptography
Sort
View
ICSM
2009
IEEE
14 years 4 months ago
Searching and skimming: An exploratory study
Source code search is an important activity for programmers working on a change task to a software system. As part of a larger project to improve tool support for finding informa...
Jamie Starke, Chris Luce, Jonathan Sillito
DDECS
2008
IEEE
184views Hardware» more  DDECS 2008»
14 years 4 months ago
Software-Based Self-Test Strategy for Data Cache Memories Embedded in SoCs
— Testing SoC is a challenging task, especially when addressing complex and highfrequency devices. Among the different techniques that can be exploited, Software-Based Selft-Test...
Wilson J. Perez, Jaime Velasco-Medina, Danilo Ravo...
ICASSP
2008
IEEE
14 years 4 months ago
An instantaneous vector representation of delta pitch for speaker-change prediction in conversational dialogue systems
As spoken dialogue systems become deployed in increasingly complex domains, they face rising demands on the naturalness of interaction. We focus on system responsiveness, aiming t...
Kornel Laskowski, Jens Edlund, Mattias Heldner
ICSM
2008
IEEE
14 years 4 months ago
Non-invasive and non-scattered annotations for more robust pointcuts
Annotations are often mentioned as a potential alternative to tackle the fragile nature of AspectJ pointcuts. However, annotations themselves can be considered crosscutting elemen...
Leonardo Silva, Samuel Domingues, Marco Tulio de O...
COMPSAC
2007
IEEE
14 years 4 months ago
Qianxiang Wang
Software that runs in the network environment is facing with many challenges. One of them is the dynamic feature of the network. To keep the quality of service, the service entity...
Qianxiang Wang