Sciweavers

747 search results - page 97 / 150
» Toward a software development methodology for anonymity appl...
Sort
View
SIGSOFT
2010
ACM
13 years 6 months ago
A study of the uniqueness of source code
This paper presents the results of the first study of the uniqueness of source code. We define the uniqueness of a unit of source code with respect to the entire body of written s...
Mark Gabel, Zhendong Su
MM
2004
ACM
94views Multimedia» more  MM 2004»
14 years 2 months ago
Towards automated story analysis using participatory design
Involving a school teacher in the development of the intelligent writing tutor StoryStation allowed progress to be made on the problem of story classification, an aspect of story...
Harry Halpin, Johanna D. Moore, Judy Robertson
ICCD
2002
IEEE
141views Hardware» more  ICCD 2002»
14 years 5 months ago
Embedded Operating System Energy Analysis and Macro-Modeling
A large and increasing number of modern embedded systems are subject to tight power/energy constraints. It has been demonstrated that the operating system (OS) can have a signifi...
Tat Kee Tan, Anand Raghunathan, Niraj K. Jha
SIGMETRICS
2010
ACM
143views Hardware» more  SIGMETRICS 2010»
14 years 1 months ago
Practical performance models for complex, popular applications
Perhaps surprisingly, no practical performance models exist for popular (and complex) client applications such as Adobe’s Creative Suite, Microsoft’s Office and Visual Studio...
Eno Thereska, Bjoern Doebel, Alice X. Zheng, Peter...
SAC
2011
ACM
12 years 11 months ago
Cloud application logging for forensics
Logs are one of the most important pieces of analytical data in a cloud-based service infrastructure. At any point in time, service owners and operators need to understand the sta...
Raffael Marty