Sciweavers

1791 search results - page 255 / 359
» Behavioral Operations
Sort
View
DSN
2000
IEEE
15 years 7 months ago
Testing for Software Vulnerability Using Environment Perturbation
We describe an methodology for testing a software system for possible security flaws. Based on the observation that most security flaws are caused by the program’s inappropria...
Wenliang Du, Aditya P. Mathur
ICCAD
2000
IEEE
188views Hardware» more  ICCAD 2000»
15 years 7 months ago
Bus Optimization for Low-Power Data Path Synthesis Based on Network Flow Method
— Sub-micron feature sizes have resulted in a considerable portion of power to be dissipated on the buses, causing an increased attention on savings for power at the behavioral l...
Sungpack Hong, Taewhan Kim
ICNP
2000
IEEE
15 years 7 months ago
Analysis of Internet Multicast Traffic Performance Considering Multicast Routing Protocol
Recently, audio and video delivery services are widely spread in the Internet. In order to deliver these data to multiple receivers at the same time, the multicast technologies ar...
Seiji Ueno, Toshihiko Kato, Kenji Suzuki
INFOCOM
2000
IEEE
15 years 7 months ago
Efficient Handoff Rerouting Algorithms: A Competitive On-Line Algorithmic Approach
—This paper considers the design of handoff rerouting algorithms for reducing the overall session cost in personal communication systems (PCS). Most modern communication systems ...
Yigal Bejerano, Israel Cidon, Joseph Naor
ISCA
2000
IEEE
111views Hardware» more  ISCA 2000»
15 years 7 months ago
Understanding the backward slices of performance degrading instructions
For many applications, branch mispredictions and cache misses limit a processor’s performance to a level well below its peak instruction throughput. A small fraction of static i...
Craig B. Zilles, Gurindar S. Sohi