Sciweavers

191 search results - page 17 / 39
» Comparing Program Phase Detection Techniques
Sort
View
ACSAC
2004
IEEE
15 years 4 months ago
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusu...
83
Voted
ISCA
1993
IEEE
92views Hardware» more  ISCA 1993»
15 years 4 months ago
The Detection and Elimination of Useless Misses in Multiprocessors
In this paper we introduce a classification of misses in shared-memory multiprocessors based on inter processor communication. We identify the set of essential misses, i.e., the s...
Michel Dubois, Jonas Skeppstedt, Livio Ricciulli, ...
106
Voted
ICPP
2008
IEEE
15 years 6 months ago
Solving Large, Irregular Graph Problems Using Adaptive Work-Stealing
Solving large, irregular graph problems efficiently is challenging. Current software systems and commodity multiprocessors do not support fine-grained, irregular parallelism wel...
Guojing Cong, Sreedhar B. Kodali, Sriram Krishnamo...
POPL
2007
ACM
16 years 22 days ago
Cork: dynamic memory leak detection for garbage-collected languages
A memory leak in a garbage-collected program occurs when the program inadvertently maintains references to objects that it no longer needs. Memory leaks cause systematic heap grow...
Maria Jump, Kathryn S. McKinley
134
Voted
BMCBI
2010
125views more  BMCBI 2010»
15 years 16 days ago
Haplotype allelic classes for detecting ongoing positive selection
Background: Natural selection eliminates detrimental and favors advantageous phenotypes. This process leaves characteristic signatures in underlying genomic segments that can be r...
Julie Hussin, Philippe Nadeau, Jean-Françoi...