Sciweavers

1687 search results - page 46 / 338
» Which pointer analysis should I use
Sort
View
152
Voted
BMCBI
2010
149views more  BMCBI 2010»
15 years 2 months ago
A multifactorial analysis of obesity as CVD risk factor: Use of neural network based methods in a nutrigenetics context
Background: Obesity is a multifactorial trait, which comprises an independent risk factor for cardiovascular disease (CVD). The aim of the current work is to study the complex eti...
Ioannis K. Valavanis, Stavroula G. Mougiakakou, Ke...
112
Voted
ASPDAC
2004
ACM
96views Hardware» more  ASPDAC 2004»
15 years 6 months ago
Rate analysis for streaming applications with on-chip buffer constraints
While mapping a streaming (such as multimedia or network packet processing) application onto a specified architecture, an important issue is to determine the input stream rates tha...
Alexander Maxiaguine, Simon Künzli, Samarjit ...
ICSE
2001
IEEE-ACM
15 years 7 months ago
Functional Paleontology: System Evolution as the User Sees It
It has long been accepted that requirements analysis should precede architectural design and implementation, but in software evolution and reverse engineering this concern with bl...
Annie I. Antón, Colin Potts
127
Voted
IWDC
2004
Springer
139views Communications» more  IWDC 2004»
15 years 8 months ago
Statistical Analysis of a P2P Query Graph Based on Degrees and Their Time-Evolution
Abstract. Despite their crucial impact on the performances of p2p systems, very few is known on peers behaviors in such networks. We propose here a study of these behaviors in a ru...
Jean-Loup Guillaume, Matthieu Latapy, Stevens Le-B...
DAC
2004
ACM
15 years 6 months ago
Probabilistic regression suites for functional verification
Random test generators are often used to create regression suites on-the-fly. Regression suites are commonly generated by choosing several specifications and generating a number o...
Shai Fine, Shmuel Ur, Avi Ziv