Sciweavers

59 search results - page 9 / 12
» A case study on value-based requirements tracing
Sort
View
MICRO
2003
IEEE
99views Hardware» more  MICRO 2003»
15 years 3 months ago
Power-driven Design of Router Microarchitectures in On-chip Networks
As demand for bandwidth increases in systems-on-a-chip and chip multiprocessors, networks are fast replacing buses and dedicated wires as the pervasive interconnect fabric for on-...
Hangsheng Wang, Li-Shiuan Peh, Sharad Malik
ICS
1993
Tsinghua U.
15 years 2 months ago
Dynamic Control of Performance Monitoring on Large Scale Parallel Systems
Performance monitoring of large scale parallel computers creates a dilemma: we need to collect detailed information to find performance bottlenecks, yet collecting all this data ...
Jeffrey K. Hollingsworth, Barton P. Miller
DSN
2008
IEEE
15 years 3 days ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
GLOBECOM
2008
IEEE
14 years 10 months ago
Security Rules Specification and Analysis Based on Passive Testing
Security is a critical issue in dynamic and open distributed environments such as network-based services or wireless networks. To ensure that a certain level of security is maintai...
Wissam Mallouli, Fayçal Bessayah, Ana R. Ca...
DEBU
2006
142views more  DEBU 2006»
14 years 10 months ago
Automated Storage Management with QoS Guarantee in Large-scale Virtualized Storage Systems
Storage virtualization in modern storage systems allows variability in the number of "physical" disks supporting a single "virtual" disk. In practice, IO workl...
Lin Qiao, Balakrishna R. Iyer, Divyakant Agrawal, ...