Sciweavers

2826 search results - page 154 / 566
» A resource-based analysis of IT sourcing
Sort
View
SIGSOFT
2003
ACM
16 years 2 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler
141
Voted
SENSYS
2004
ACM
15 years 7 months ago
An analysis of a large scale habitat monitoring application
Habitat and environmental monitoring is a driving application for wireless sensor networks. We present an analysis of data from a second generation sensor networks deployed during...
Robert Szewczyk, Alan M. Mainwaring, Joseph Polast...
BMCBI
2006
109views more  BMCBI 2006»
15 years 1 months ago
Integrated analysis of gene expression by association rules discovery
Background: Microarray technology is generating huge amounts of data about the expression level of thousands of genes, or even whole genomes, across different experimental conditi...
Pedro Carmona-Saez, Monica Chagoyen, Andrés...
CAV
2011
Springer
253views Hardware» more  CAV 2011»
14 years 5 months ago
HAMPI: A String Solver for Testing, Analysis and Vulnerability Detection
Abstract. Many automatic testing, analysis, and verification techniques for programs can effectively be reduced to a constraint-generation phase followed by a constraint-solving ...
Vijay Ganesh, Adam Kiezun, Shay Artzi, Philip J. G...
SIGMETRICS
2011
ACM
237views Hardware» more  SIGMETRICS 2011»
14 years 4 months ago
Analysis of DCTCP: stability, convergence, and fairness
Cloud computing, social networking and information networks (for search, news feeds, etc) are driving interest in the deployment of large data centers. TCP is the dominant Layer 3...
Mohammad Alizadeh, Adel Javanmard, Balaji Prabhaka...