Sciweavers

2165 search results - page 123 / 433
» cases 2005
Sort
View
ITRUST
2005
Springer
15 years 9 months ago
Modeling Social and Individual Trust in Requirements Engineering Methodologies
Abstract. When we model and analyze trust in organizations or information systems we have to take into account two different levels of analysis: social and individual. Social leve...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...
HPCA
2005
IEEE
16 years 4 months ago
On the Limits of Leakage Power Reduction in Caches
If current technology scaling trends hold, leakage power dissipation will soon become the dominant source of power consumption in high performance processors. Caches, due to the f...
Yan Meng, Timothy Sherwood, Ryan Kastner
ESA
2005
Springer
176views Algorithms» more  ESA 2005»
15 years 9 months ago
On Degree Constrained Shortest Paths
Abstract. Traditional shortest path problems play a central role in both the design and use of communication networks and have been studied extensively. In this work, we consider a...
Samir Khuller, Kwangil Lee, Mark A. Shayman
ICIP
2005
IEEE
16 years 5 months ago
Performance evaluation of parametric bias field correction
Magnetic Resonance (MR) images often exhibit grayscale nonuniformities, caused by radio frequency (RF) coil design or acquisition sequences. Many algorithms to remove these nonuni...
Vitali Zagorodnov, Mads Fogtmann Hansen
CSMR
2005
IEEE
15 years 9 months ago
Correlating Features and Code Using a Compact Two-Sided Trace Analysis Approach
Software developers are constantly required to modify and adapt application features in response to changing requirements. The problem is that just by reading the source code, it ...
Orla Greevy, Stéphane Ducasse