Sciweavers

2615 search results - page 191 / 523
» Analysis of Real Time Operating System Based Applications
Sort
View
137
Voted
WEBI
2009
Springer
15 years 10 months ago
Revealing Hidden Community Structures and Identifying Bridges in Complex Networks: An Application to Analyzing Contents of Web P
The emergence of scale free and small world properties in real world complex networks has stimulated lots of activity in the field of network analysis. An example of such a netwo...
Faraz Zaidi, Arnaud Sallaberry, Guy Melanço...
119
Voted
CSMR
2005
IEEE
15 years 9 months ago
Correlating Features and Code Using a Compact Two-Sided Trace Analysis Approach
Software developers are constantly required to modify and adapt application features in response to changing requirements. The problem is that just by reading the source code, it ...
Orla Greevy, Stéphane Ducasse
127
Voted
ENTCS
2006
185views more  ENTCS 2006»
15 years 3 months ago
Time Domain Verification of Oscillator Circuit Properties
The application of formal methods to analog and mixed signal circuits requires efficient methods tructing abstractions of circuit behaviors. This paper concerns the verification o...
Goran Frehse, Bruce H. Krogh, Rob A. Rutenbar, Ode...
135
Voted
SDM
2009
SIAM
170views Data Mining» more  SDM 2009»
16 years 29 days ago
Optimal Distance Bounds on Time-Series Data.
Most data mining operations include an integral search component at their core. For example, the performance of similarity search or classification based on Nearest Neighbors is ...
Michail Vlachos, Philip S. Yu, Suleyman S. Kozat
131
Voted
MINENET
2006
ACM
15 years 9 months ago
Forensic analysis of autonomous system reachability
Security incidents have an adverse impact not only on end systems, but also on Internet routing, resulting in many out-of-reach prefixes. Previous work has looked at performance ...
D. K. Lee, Sue B. Moon, Taesang Choi, Taesoo Jeong