Sciweavers

1548 search results - page 198 / 310
» Estimating Software Vulnerabilities
Sort
View
SIGOPS
2010
179views more  SIGOPS 2010»
14 years 6 months ago
Online cache modeling for commodity multicore processors
Modern chip-level multiprocessors (CMPs) contain multiple processor cores sharing a common last-level cache, memory interconnects, and other hardware resources. Workloads running ...
Richard West, Puneet Zaroo, Carl A. Waldspurger, X...
KBSE
2007
IEEE
15 years 5 months ago
Modeling bug report quality
Software developers spend a significant portion of their resources handling user-submitted bug reports. For software that is widely deployed, the number of bug reports typically ...
Pieter Hooimeijer, Westley Weimer
KBSE
2005
IEEE
15 years 5 months ago
A context-sensitive structural heuristic for guided search model checking
Software verification using model checking often translates programs into corresponding transition systems that model the program behavior. As software systems continue to grow i...
Neha Rungta, Eric G. Mercer
ICIAP
2007
ACM
15 years 11 months ago
Document Image Mosaicing with Mobile Phones
This paper presents a novel user interaction concept for document image scanning with mobile phones. A high resolution mosaic image is constructed in two main stages. Firstly, onl...
Jari Hannuksela, Pekka Sangi, Janne Heikkilä,...
ICCAD
2003
IEEE
154views Hardware» more  ICCAD 2003»
15 years 8 months ago
Fast, Accurate Static Analysis for Fixed-Point Finite-Precision Effects in DSP Designs
Translating digital signal processing (DSP) software into its finite-precision hardware implementation is often a timeconsuming task. We describe a new static analysis technique ...
Claire Fang Fang, Rob A. Rutenbar, Tsuhan Chen