Sciweavers

1141 search results - page 19 / 229
» Analyzing Electroencephalograms Using Cloud Computing Techni...
Sort
View
117
Voted
RTSS
2007
IEEE
15 years 6 months ago
Composing Functional and State-Based Performance Models for Analyzing Heterogeneous Real-Time Systems
— We present a performance analysis technique for distributed real-time systems in a setting where certain components are modeled in a purely functional manner, while the remainin...
Linh T. X. Phan, Samarjit Chakraborty, P. S. Thiag...
ICCD
2006
IEEE
111views Hardware» more  ICCD 2006»
15 years 9 months ago
Implicit Search-Space Aware Cofactor Expansion: A Novel Preimage Computation Technique
Abstract— In this paper, we introduce a novel preimage computation technique that directly computes the circuit cofactors without an explicit search for any satisfiable solution...
Kameshwar Chandrasekar, Michael S. Hsiao
CCS
2007
ACM
15 years 4 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
NSDI
2010
15 years 1 months ago
Centrifuge: Integrated Lease Management and Partitioning for Cloud Services
: Making cloud services responsive is critical to providing a compelling user experience. Many largescale sites, including LinkedIn, Digg and Facebook, address this need by deployi...
Atul Adya, John Dunagan, Alec Wolman
DSN
2008
IEEE
15 years 6 months ago
Analyzing the effects of disk-pointer corruption
The long-term availability of data stored in a file system depends on how well it safeguards on-disk pointers used to access the data. Ideally, a system would correct all pointer...
Lakshmi N. Bairavasundaram, Meenali Rungta, Nitin ...