Sciweavers

2111 search results - page 369 / 423
» An Approach to Software Testing of Machine Learning Applicat...
Sort
View
KBSE
2007
IEEE
15 years 9 months ago
Effective memory protection using dynamic tainting
Programs written in languages that provide direct access to memory through pointers often contain memory-related faults, which may cause non-deterministic failures and even securi...
James A. Clause, Ioannis Doudalis, Alessandro Orso...
108
Voted
IPSN
2010
Springer
15 years 10 months ago
Slotted programming for sensor networks
We advocate a novel programming approach we call slotted programming that not only addresses the specific hardware capabilities of sensor nodes, but also facilitates coding throu...
Roland Flury, Roger Wattenhofer
DCOSS
2011
Springer
14 years 2 months ago
Compiling business process models for sensor networks
—Wireless sensor networks are increasingly being used to improve business processes. The behavior of such a process is usually captured in models while its implementation is typi...
Alexandra Caracas, Alexander Bernauer
ASWEC
2009
IEEE
15 years 10 months ago
Component Coordination in GLoo
Incorporating components from a number of different sources into a given application is generally considered to be a non-trivial activity. Over the years, various coordination mec...
Jean-Guy Schneider, Markus Lumpe
NOMS
2010
IEEE
251views Communications» more  NOMS 2010»
15 years 1 months ago
Online detection of utility cloud anomalies using metric distributions
—The online detection of anomalies is a vital element of operations in data centers and in utility clouds like Amazon EC2. Given ever-increasing data center sizes coupled with th...
Chengwei Wang, Vanish Talwar, Karsten Schwan, Part...