Sciweavers

1259 search results - page 237 / 252
» Use Cases, Actions, and Roles
Sort
View
PPOPP
2003
ACM
14 years 20 days ago
Compiler support for speculative multithreading architecture with probabilistic points-to analysis
Speculative multithreading (SpMT) architecture can exploit thread-level parallelism that cannot be identified statically. Speedup can be obtained by speculatively executing threa...
Peng-Sheng Chen, Ming-Yu Hung, Yuan-Shin Hwang, Ro...
HICSS
2002
IEEE
116views Biometrics» more  HICSS 2002»
14 years 11 days ago
E-commerce Security Issues
Without trust, most prudent business operators and clients may decide to forgo use of the Internet and revert back to traditional methods of doing business. To counter this trend,...
Randy C. Marchany, Joseph G. Tront
SIGUCCS
1999
ACM
13 years 11 months ago
Bridging Worlds: The IT Support Professional as Interpreter Between Cultures
One result of the action of Moore’s Law, the doubling of IT (Information Technology) power every 18 months, is a widening gap in the understanding of this technology between tho...
Don Rea
ICCAD
1999
IEEE
86views Hardware» more  ICCAD 1999»
13 years 11 months ago
A framework for testing core-based systems-on-a-chip
Available techniques for testing core-based systems-on-a-chip (SOCs) do not provide a systematic means for synthesising low-overhead test architectures and compact test solutions....
Srivaths Ravi, Ganesh Lakshminarayana, Niraj K. Jh...
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
13 years 11 months ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...