Sciweavers

433 search results - page 25 / 87
» Contracts: From Analysis to C Implementation
Sort
View
ISCA
1997
IEEE
137views Hardware» more  ISCA 1997»
15 years 1 months ago
VM-Based Shared Memory on Low-Latency, Remote-Memory-Access Networks
Recent technological advances have produced network interfaces that provide users with very low-latency access to the memory of remote machines. We examine the impact of such netw...
Leonidas I. Kontothanassis, Galen C. Hunt, Robert ...
86
Voted
BMCBI
2007
163views more  BMCBI 2007»
14 years 9 months ago
Use of genomic DNA control features and predicted operon structure in microarray data analysis: ArrayLeaRNA - a Bayesian approac
Background: Microarrays are widely used for the study of gene expression; however deciding on whether observed differences in expression are significant remains a challenge. Resul...
Carmen Pin, Mark Reuter
FMICS
2007
Springer
15 years 3 months ago
An Approach to Formalization and Analysis of Message Passing Libraries
Message passing using libraries implementing the Message Passing Interface (MPI) standard is the dominant communication mechanism in high performance computing (HPC) applications. ...
Robert Palmer, Michael Delisi, Ganesh Gopalakrishn...
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 1 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
SENSYS
2004
ACM
15 years 3 months ago
An analysis of a large scale habitat monitoring application
Habitat and environmental monitoring is a driving application for wireless sensor networks. We present an analysis of data from a second generation sensor networks deployed during...
Robert Szewczyk, Alan M. Mainwaring, Joseph Polast...