Sciweavers

1548 search results - page 275 / 310
» Estimating Software Vulnerabilities
Sort
View
DS
1997
117views Database» more  DS 1997»
15 years 12 days ago
Experience with a Combined Approach to Attribute-Matching Across Heterogeneous Databases
Determining attribute correspondences is a difficult, time-consuming, knowledge-intensive part of database integration. We report on experiences with tools that identified candi...
Chris Clifton, E. Housman, Arnon Rosenthal
WSC
1997
15 years 12 days ago
Efficient Instruction Cache Simulation and Execution Profiling with a Threaded-Code Interpreter
We present an extension to an existing SPARC V8 instruction set simulator, SimICS, to support accurate profiling of branches and instruction cache misses. SimICS had previously su...
Peter S. Magnusson
CASCON
1996
160views Education» more  CASCON 1996»
15 years 11 days ago
Automatic generation of performance models for distributed application systems
Organizations have become increasingly dependent on computing systems to achieve their business goals. The performance of these systems in terms of response times and cost has a m...
M. Qin, R. Lee, Asham El Rayess, Vidar Vetland, Je...
ICASSP
2010
IEEE
14 years 11 months ago
Improved Internet traffic analysis via optimized sampling
Applications to evaluate Internet quality-of-service and increase network security are essential to maintaining reliability and high performance in computer networks. These applic...
Sean McPherson, Antonio Ortega
BIOINFORMATICS
2010
109views more  BIOINFORMATICS 2010»
14 years 11 months ago
Phylogenetic networks do not need to be complex: using fewer reticulations to represent conflicting clusters
Phylogenetic trees are widely used to display estimates of how groups of species evolved. Each phylogenetic tree can be seen as a collection of clusters, subgroups of the species ...
Leo van Iersel, Steven Kelk, Regula Rupp, Daniel H...