Sciweavers

1548 search results - page 226 / 310
» Estimating Software Vulnerabilities
Sort
View
NOMS
2008
IEEE
15 years 5 months ago
PathCrawler: Automatic harvesting web infra-structure
Abstract—As network topologies have grown in size and complexity, it is becoming a daunting task for network administrators to keep track the capacity dimensioning of newly insta...
Cesar Marcondes, M. Y. Sanadidi, Mario Gerla, Ramo...
ICRA
2007
IEEE
154views Robotics» more  ICRA 2007»
15 years 5 months ago
A Policy for Open-Loop Attenuation of Disturbance Effects Caused by Uncertain Ground Properties in Running
— Outside of the laboratory, accurate models of ground impact dynamics are either difficult or impossible to obtain. Instead, a rigid ground model is often used in gait and cont...
Jonathan W. Hurst, Benjamin Morris, Joel E. Chestn...
ISORC
2007
IEEE
15 years 5 months ago
Experiences from Applying WCET Analysis in Industrial Settings
Knowing the program timing characteristics is fundamental to the successful design and execution of real-time systems. Today, measurement-based timing analysis tools such as in-ci...
Jan Gustafsson, Andreas Ermedahl
CLEAR
2007
Springer
144views Biometrics» more  CLEAR 2007»
15 years 5 months ago
The SRI-ICSI Spring 2007 Meeting and Lecture Recognition System
We describe the latest version of the SRI-ICSI meeting and lecture recognition system, as was used in the NIST RT-07 evaluations, highlighting improvements made over the last year....
Andreas Stolcke, Xavier Anguera, Kofi Boakye, &Oum...
JSSPP
2007
Springer
15 years 5 months ago
A Self-optimized Job Scheduler for Heterogeneous Server Clusters
Heterogeneous clusters and grid infrastructures are becoming increasingly popular. In these computing infrastructures, machines have different resources, including memory sizes, d...
Elad Yom-Tov, Yariv Aridor