Sciweavers

1383 search results - page 199 / 277
» Computational Mechanisms for Distributed Requirements Engine...
Sort
View
245
Voted
SADFE
2010
IEEE
15 years 3 months ago
Fonts for Forensics
: Like other latent evidence that cannot be directly perceived by people, bit sequences have to be presented through tools. Presentations of digital forensic evidence often involve...
Fred Cohen
HPDC
1999
IEEE
15 years 9 months ago
Process Hijacking
Process checkpointing is a basic mechanism required for providing High Throughput Computing service on distributively owned resources. We present a new process checkpoint and migr...
Victor C. Zandy, Barton P. Miller, Miron Livny
HPCA
1999
IEEE
15 years 9 months ago
Dynamically Exploiting Narrow Width Operands to Improve Processor Power and Performance
In general-purpose microprocessors, recent trends have pushed towards 64-bit word widths, primarily to accommodate the large addressing needs of some programs. Many integer proble...
David Brooks, Margaret Martonosi
ACMDIS
2006
ACM
15 years 11 months ago
Collaborative architecture design and evaluation
In this paper we describe a collaborative environment created to support distributed evaluation of a complex system architecture. The approach couples an interactive architecture ...
Steven R. Haynes, Amie L. Skattebo, Jonathan A. Si...
ISSTA
2006
ACM
15 years 11 months ago
Path-oriented random testing
Test campaigns usually require only a restricted subset of paths in a program to be thoroughly tested. As random testing (RT) offers interesting fault-detection capacities at low ...
Arnaud Gotlieb, Matthieu Petit