Sciweavers

8177 search results - page 277 / 1636
» Detecting System Emulators
Sort
View
142
Voted
COMCOM
2002
189views more  COMCOM 2002»
15 years 3 months ago
Intrusion detection techniques and approaches
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and...
Theuns Verwoerd, Ray Hunt
127
Voted
ICIP
2005
IEEE
16 years 4 months ago
Lung nodules detection and classification
Image processing techniques and Computer Aided Diagnosis (CAD) systems have proved to be effective for the improvement of radiologists' diagnosis. In this paper an automatic ...
Paola Campadelli, Elena Casiraghi, Giorgio Valenti...
SOSP
2003
ACM
16 years 4 days ago
RacerX: effective, static detection of race conditions and deadlocks
This paper describes RacerX, a static tool that uses flowsensitive, interprocedural analysis to detect both race conditions and deadlocks. It is explicitly designed to find erro...
Dawson R. Engler, Ken Ashcraft
IPPS
2007
IEEE
15 years 9 months ago
Detecting Runtime Environment Interference with Parallel Application Behavior
Many performance problems observed in high end systems are actually caused by the runtime system and not the application code. Detecting these cases will require parallel performa...
Rashawn L. Knapp, Karen L. Karavanic, Douglas M. P...
121
Voted
IWPSE
2003
IEEE
15 years 8 months ago
Reconstruction of Successful Software Evolution Using Clone Detection
In modern software engineering, researchers regard a software system as an organic life form that must continue to evolve to remain successful. Unfortunately, little is known abou...
Filip Van Rysselberghe, Serge Demeyer