Sciweavers

3456 search results - page 492 / 692
» Byte Code Engineering
Sort
View
119
Voted
RAID
2010
Springer
15 years 1 months ago
Inferring Protocol State Machine from Real-World Trace
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...
Yipeng Wang, Zhibin Zhang, Li Guo
158
Voted
SOFTVIS
2010
ACM
15 years 1 months ago
Visual comparison of software architectures
Reverse engineering methods produce different descriptions of software architectures. In this work we analyze and define the task of exploring and comparing these descriptions. ...
Fabian Beck, Stephan Diehl
TOOLS
2010
IEEE
15 years 1 months ago
Visualizing Dynamic Metrics with Profiling Blueprints
While traditional approaches to code profiling help locate performance bottlenecks, they offer only limited support for removing these bottlenecks. The main reason is the lack of v...
Alexandre Bergel, Romain Robbes, Walter Binder
131
Voted
ICPPW
2009
IEEE
15 years 1 months ago
Characterizing the Performance of
Using Linux for high-performance applications on the compute nodes of IBM Blue Gene/P is challenging because of TLB misses and difficulties with programming the network DMA engine...
Kazutomo Yoshii, Kamil Iskra, Harish Naik, Pete Be...
160
Voted
TCOM
2010
147views more  TCOM 2010»
14 years 10 months ago
On a Ratio of Functions of Exponential Random Variables and Some Applications
Consider independent and identically distributed exponential random variables (r.vs) 1, 2, . . . , and positive scalars 1, 2, . . . , . In this letter, we present the probability...
Ramesh Annavajjala, Ananthanarayanan Chockalingam,...