Sciweavers

92 search results - page 11 / 19
» Detecting Undetectable Controller Faults Using Power Analysi...
Sort
View
ISLPED
2004
ACM
139views Hardware» more  ISLPED 2004»
15 years 3 months ago
Eliminating voltage emergencies via microarchitectural voltage control feedback and dynamic optimization
Microprocessor designers use techniques such as clock gating to reduce power dissipation. An unfortunate side-effect of these techniques is the processor current fluctuations th...
Kim M. Hazelwood, David Brooks
BMCBI
2011
14 years 1 months ago
A fast and accurate method to detect allelic genomic imbalances underlying mosaic rearrangements using SNP array data
Background: Mosaicism for copy number and copy neutral chromosomal rearrangements has been recently identified as a relatively common source of genetic variation in the normal pop...
Juan R. González, Benjamin Rodriguez-Santia...
JSS
2008
122views more  JSS 2008»
14 years 8 months ago
Traffic-aware stress testing of distributed real-time systems based on UML models using genetic algorithms
This report presents a model-driven, stress test methodology aimed at increasing chances of discovering faults related to network traffic in Distributed Real-Time Systems (DRTS). T...
Vahid Garousi, Lionel C. Briand, Yvan Labiche
INFOCOM
2007
IEEE
15 years 4 months ago
A New Search Algorithm using Autonomous and Cooperative Multiple Sensor Nodes
— In this paper, we study search algorithms for using a set of autonomous and cooperative mobile sensor nodes (MSN) with limited sensing and communication ranges to search a larg...
Seokhoon Yoon, Chunming Qiao
CHI
2007
ACM
15 years 2 months ago
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...