Sciweavers

1931 search results - page 355 / 387
» Why we blog
Sort
View
SAC
2009
ACM
14 years 2 months ago
Impact of function inlining on resource-constrained embedded systems
With the development of computer systems, function inlining schemes were used to reduce execution time while increasing codes. In embedded systems such as wireless sensor nodes, t...
Bongjae Kim, Sangho Yi, Yookun Cho, Jiman Hong
ECOOP
1999
Springer
14 years 2 months ago
Foundations for Virtual Types
Virtual types have been proposed as a notation for generic programming in object-oriented languages—an alternative to the more familiar mechanism of parametric classes. The trade...
Atsushi Igarashi, Benjamin C. Pierce
ICSE
1999
IEEE-ACM
14 years 2 months ago
Experience with Performing Architecture Tradeoff Analysis
Software architectures, like complex designs in any field, embody tradeoffs made by the designers. However, these tradeoffs are not always made explicitly by the designers and the...
Rick Kazman, Mario Barbacci, Mark Klein, S. Jeromy...
RAID
1999
Springer
14 years 2 months ago
Combining Knowledge Discovery and Knowledge Engineering to Build IDSs
We have been developing a data mining (i.e., knowledge discovery) framework, MADAM ID, for Mining Audit Data for Automated Models for Intrusion Detection [LSM98, LSM99b, LSM99a]. ...
Wenke Lee, Salvatore J. Stolfo
CHI
1997
ACM
14 years 2 months ago
Sensing Activity in Video Images
in CHI’97 Extended Abstract, ACM Press, pp. 319-320 based awareness tools and iconic indicators because it meets three crucial user requirements. This paper describes the activit...
Alison Lee, Kevin Schlueter, Andreas Girgensohn