Conferences related to Permission

Back to Top

2013 International Symposium on Theoretical Aspects of Software Engineering (TASE)

Theoretical Aspects of Software Engineering

  • 2012 Sixth International Symposium on Theoretical Aspects of Software Engineering (TASE)

    Large scale software systems are of growing concern to academia and industry. This poses new challenges to the various aspects of software engineering, for instance, the reliability of software development, Web-oriented software architecture and aspect and object-orientation techniques. New concepts and methodologies are required to enhance the development of SE from theoretical aspects. TASE 2012 is a forum for researchers to present ideas, results, and ongoing research on theoretical advances in SE.

  • 2011 IEEE 5th International Symposium on Theoretical Aspects of Software Engineering (TASE)

    TASE 2011 aims to become a forum for the presentation and discussion of new fundamental ideas in software engineering of large-scale systems.

  • 2010 4th IEEE International Symposium on Theoretical Aspects of Software Engineering (TASE)

    automata logics set theory type theory process algebrae probability game theory theorem-proving model-checking simulation-checking testing simulation requirements engineering specification Model-Driven Engineering software architectures and synthesis aspect and object orientation embedded and real-time systems software processes and workflows component-based software engineering software safety, security and reliability reverse engineering and software maintenance

  • 2009 3rd IEEE International Symposium on Theoretical Aspects of Software Engineering (TASE)

    Large scale software systems and the Internet are of growing concern to academia and industry. This poses new challenges to the various aspects of software engineering, for instance, the reliability of software development, web-oriented software architecture and aspect and object-orientation techniques. As a result, new concepts and methodologies are required to enhance the development of software engineering from theoretical aspects. TASE 2009 is a forum for researchers from academia, industry and governme

  • 2008 2nd IEEE/IFIP International Symposium on Theoretical Aspects of Software Engineering (TASE)

    TASE 2008 is a forum for researchers from academia, industry and government to present ideas, results, and ongoing research on theoretical advances in software engineering.


2012 IEEE International Symposium on Policies for Distributed Systems and Networks - POLICY

The symposium brings together researchers and practitioners working on policy-based systems across a wide range of application domains including policy-based networking, privacy, trust and security management, autonomic computing, pervasive systems and enterprise systems. POLICY 2012 is the 13th in a series of successful events, which have provided a forum for discussion and collaboration between researchers, developers and users of policy-based systems.


2011 3rd International Conference on Multimedia Information Networking and Security (MINES)

Multimedia computing and intelligence Information networking and communication Service science and Intelligence Multimedia information security Communication and network security


2010 2nd International Conference on Information Science and Engineering (ICISE)

ICISE2010 aims to provide a high-level international forum for researchers and engineers to present and discuss recent advances and new techniques in information processing technology.

  • 2009 1st International Conference on Information Science and Engineering (ICISE)

    Computer Science, Information Technology, Information Engineering


2005 Computers in Cardiology Conference



Periodicals related to Permission

Back to Top

Latin America Transactions, IEEE (Revista IEEE America Latina)

The IEEE Region 9 is releasing the IEEE Latin America Transactions to enable the publication of non-published and technically excellent papers from Latin American engineers, in Spanish or Portuguese languages. Engineers and researchers from Portugal and Spain (and others countries with the same language) are also very welcome to submit their proposals.


Security & Privacy, IEEE

IEEE Security & Privacy seeks to stimulate and track advances in security, privacy, and dependability and present these advances for a broad cross-section of academic researchers and industry practitioners. IEEE Security & Privacy aims to provide a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of security and dependability of computer-based systems, including legal ...


Selected Areas in Communications, IEEE Journal on

All telecommunications, including telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation, including radio; wire; aerial, underground, coaxial, and submarine cables; waveguides, communication satellites, and lasers; in marine, aeronautical, space, and fixed station services; repeaters, radio relaying, signal storage, and regeneration; telecommunication error detection and correction; multiplexing and carrier techniques; communication switching systems; data communications; communication theory; and wireless communications.



Most published Xplore authors for Permission

Back to Top

Xplore Articles related to Permission

Back to Top

Energy reduction in queues and stacks by adaptive bitwidth compression

V. G. Moshnyaga Low Power Electronics and Design, International Symposium on, 2001., 2001

A new micro-architectural technique to reduce energy dissipated by queues and stacks is proposed. Similarly to related research which targets the transition activity in bit-lines, the technique is based on bitwidth compression. However unlike them, it utilizes the fixed accessing order embodied in queues and stacks to exploit input data correlation. The technique dynamically adjusts the required bitwidth to the ...


Instruction flow-based front-end throttling for power-aware high-performance processors

A. Baniasadi; A. Moshovos Low Power Electronics and Design, International Symposium on, 2001., 2001

We present a number of power-aware instruction front-end (fetch/decode) throttling methods for high-performance dynamically-scheduled superscalar processors. Our methods reduce power dissipation by selectively turning on and off instruction fetch and decode. Moreover, they have a negligible impact on performance as they deliver instructions just in time for exploiting the available parallelism. Previously proposed front-end throttling methods rely on branch prediction ...


Parallel Retrograde Analysis on a Distributed System

H. Bal; V. Allis Proceedings of the IEEE/ACM SC95 Conference, 1995

Retrograde Analysis (RA) is an AI search technique used to compute endgame databases, which contain optimal solutions for part of the search space of a game. RA has been applied successfully to several games, but its usefulness is restricted by the huge amount of CPU time and internal memory it requires. We present a parallel distributed algorithm for RA that ...


Improving software security with a C pointer analysis

D. Avots; M. Dalton; V. B. Livshits; M. S. Lam Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005., 2005

This paper presents a context-sensitive, inclusion-based, field-sensitive points-to analysis for C, which we use to detect and prevent program security vulnerabilities. In addition to a conservative points-to analysis, we propose an optimistic analysis that assumes a more restricted C semantics reflecting common C usage in order to increase the precision of the analysis. Using the proposed pointer alias analyses, we ...


Ground Water Assessment in the Ivy Section of Albemarle County

Marshall Koch; Daniel Harlan; Lydia Abebe; Minkang Jung; Guy Duval; Nancy Fechnay; Garrick Louis; Jeff Rogers 2006 IEEE Systems and Information Engineering Design Symposium, 2006

Many Americans, especially those in metropolitan areas, take the availability and abundance of good water for granted. For many rural people, however, adequate and safe water supplies are not guaranteed. Approximately one sixth of all Americans rely on a groundwater supply that is continually threatened by increased demand and sources of contamination. A team of six Systems Engineering students under ...


More Xplore Articles

Educational Resources on Permission

Back to Top

eLearning

Energy reduction in queues and stacks by adaptive bitwidth compression

V. G. Moshnyaga Low Power Electronics and Design, International Symposium on, 2001., 2001

A new micro-architectural technique to reduce energy dissipated by queues and stacks is proposed. Similarly to related research which targets the transition activity in bit-lines, the technique is based on bitwidth compression. However unlike them, it utilizes the fixed accessing order embodied in queues and stacks to exploit input data correlation. The technique dynamically adjusts the required bitwidth to the ...


Instruction flow-based front-end throttling for power-aware high-performance processors

A. Baniasadi; A. Moshovos Low Power Electronics and Design, International Symposium on, 2001., 2001

We present a number of power-aware instruction front-end (fetch/decode) throttling methods for high-performance dynamically-scheduled superscalar processors. Our methods reduce power dissipation by selectively turning on and off instruction fetch and decode. Moreover, they have a negligible impact on performance as they deliver instructions just in time for exploiting the available parallelism. Previously proposed front-end throttling methods rely on branch prediction ...


Parallel Retrograde Analysis on a Distributed System

H. Bal; V. Allis Proceedings of the IEEE/ACM SC95 Conference, 1995

Retrograde Analysis (RA) is an AI search technique used to compute endgame databases, which contain optimal solutions for part of the search space of a game. RA has been applied successfully to several games, but its usefulness is restricted by the huge amount of CPU time and internal memory it requires. We present a parallel distributed algorithm for RA that ...


Improving software security with a C pointer analysis

D. Avots; M. Dalton; V. B. Livshits; M. S. Lam Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005., 2005

This paper presents a context-sensitive, inclusion-based, field-sensitive points-to analysis for C, which we use to detect and prevent program security vulnerabilities. In addition to a conservative points-to analysis, we propose an optimistic analysis that assumes a more restricted C semantics reflecting common C usage in order to increase the precision of the analysis. Using the proposed pointer alias analyses, we ...


Ground Water Assessment in the Ivy Section of Albemarle County

Marshall Koch; Daniel Harlan; Lydia Abebe; Minkang Jung; Guy Duval; Nancy Fechnay; Garrick Louis; Jeff Rogers 2006 IEEE Systems and Information Engineering Design Symposium, 2006

Many Americans, especially those in metropolitan areas, take the availability and abundance of good water for granted. For many rural people, however, adequate and safe water supplies are not guaranteed. Approximately one sixth of all Americans rely on a groundwater supply that is continually threatened by increased demand and sources of contamination. A team of six Systems Engineering students under ...


More eLearning Resources

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Permission"

IEEE-USA E-Books



Standards related to Permission

Back to Top

No standards are currently tagged "Permission"