Sciweavers

1548 search results - page 241 / 310
» Estimating Software Vulnerabilities
Sort
View
COMSWARE
2008
IEEE
15 years 5 months ago
Tracking target using sensor networks: target detection and route activation under energy constraints
—In this paper we consider tracking a target moving in a 2D plane using a network of sensors, each of which is capable of detecting presence of the target in its vicinity and com...
Vaishali P. Sadaphal, Bijendra N. Jain
CISIS
2007
IEEE
15 years 5 months ago
Obtaining Performance Measures through Microbenchmarking in a Peer-to-Peer Overlay Computer
: The availability of enormous amounts of un-used computing power and data storage over the In-ternet makes the development of a globally distributed computing platform, called Ove...
Paolo Bertasi, Mauro Bianco, Andrea Pietracaprina,...
CODES
2007
IEEE
15 years 5 months ago
Probabilistic performance risk analysis at system-level
We present a novel hybrid approach for performance analysis of a system design. Unlike other approaches in this area, in this paper we do not focus on the determination of pessimi...
Alexander Viehl, Markus Schwarz, Oliver Bringmann,...
FPL
2007
Springer
178views Hardware» more  FPL 2007»
15 years 5 months ago
Exploring Alternative 3D FPGA Architectures: Design Methodology and CAD Tool Support
This paper introduces a software supported methodology for exploring/evaluating 3D FPGA architectures. Two new CAD tools are developed: (i) the 3DPRO for placement and routing on ...
Kostas Siozios, Kostas Sotiriadis, Vasilis F. Pavl...
GECCO
2007
Springer
276views Optimization» more  GECCO 2007»
15 years 5 months ago
Automatic mutation test input data generation via ant colony
Fault-based testing is often advocated to overcome limitations of other testing approaches; however it is also recognized as being expensive. On the other hand, evolutionary algor...
Kamel Ayari, Salah Bouktif, Giuliano Antoniol