Sciweavers

2957 search results - page 261 / 592
» Code analysis and CS-XML
Sort
View
ICMCS
2006
IEEE
132views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Analysis and Evaluation of the Skype and Google-Talk Voip Systems
In this paper, we study Skype and Google Talk, two widely used VoIP systems, and compare their perceptual speech quality with that of our proposed system using UDP packet traces c...
Batu Sat, Benjamin W. Wah
SIGMETRICS
2006
ACM
116views Hardware» more  SIGMETRICS 2006»
15 years 9 months ago
Applying architectural vulnerability Analysis to hard faults in the microprocessor
In this paper, we present a new metric, Hard-Fault Architectural Vulnerability Factor (H-AVF), to allow designers to more effectively compare alternate hard-fault tolerance scheme...
Fred A. Bower, Derek Hower, Mahmut Yilmaz, Daniel ...
CANS
2005
Springer
86views Cryptology» more  CANS 2005»
15 years 9 months ago
On the Performance and Analysis of DNS Security Extensions
The Domain Name System (DNS) is an essential component of the critical infrastructure of the Internet. The role of DNS is vital, as it is involved in virtually every Internet tran...
Reza Curtmola, Aniello Del Sorbo, Giuseppe Atenies...
HPCC
2005
Springer
15 years 9 months ago
A Loop-Aware Search Strategy for Automated Performance Analysis
Abstract. Automated online search is a powerful technique for performance diagnosis. Such a search can change the types of experiments it performs while the program is running, mak...
Eli D. Collins, Barton P. Miller
SIGADA
2004
Springer
15 years 9 months ago
Comparative analysis of genetic algorithm implementations
Genetic Algorithms provide computational procedures that are modeled on natural genetic system mechanics, whereby a coded solution is “evolved” from a set of potential solutio...
Robert Soricone, Melvin Neville