Sciweavers

514 search results - page 36 / 103
» The uses of paper in commercial airline flight operations
Sort
View
USS
2010
13 years 5 months ago
Automatic Generation of Remediation Procedures for Malware Infections
Despite the widespread deployment of malwaredetection software, in many situations it is difficult to preemptively block a malicious program from infecting a system. Rather, signa...
Roberto Paleari, Lorenzo Martignoni, Emanuele Pass...
ITC
2003
IEEE
222views Hardware» more  ITC 2003»
14 years 29 days ago
Race: A Word-Level ATPG-Based Constraints Solver System For Smart Random Simulation
Functional verification of complex designs largely relies on the use of simulation in conjunction high-level verification languages (HVL) and test-bench automation (TBA) tools. In...
Mahesh A. Iyer
MOBICOM
2012
ACM
11 years 10 months ago
CloudIQ: a framework for processing base stations in a data center
The cellular industry is evaluating architectures to distribute the signal processing in radio access networks. One of the options is to process the signals of all base stations o...
Sourjya Bhaumik, Shoban Preeth Chandrabose, Manjun...
VLDB
2004
ACM
161views Database» more  VLDB 2004»
14 years 8 months ago
Supporting top-k join queries in relational databases
Ranking queries produce results that are ordered on some computed score. Typically, these queries involve joins, where users are usually interested only in the top-k join results....
Ihab F. Ilyas, Walid G. Aref, Ahmed K. Elmagarmid
MOBICOM
2004
ACM
14 years 1 months ago
Power conservation and quality of surveillance in target tracking sensor networks
Target tracking is an important application of wireless sensor networks. In this application, the sensor nodes collectively monitor and track the movement of an event or target ob...
Chao Gui, Prasant Mohapatra