Sciweavers

1548 search results - page 281 / 310
» Estimating Software Vulnerabilities
Sort
View
SIAMJO
2011
14 years 4 months ago
Erratum: Validated Linear Relaxations and Preprocessing: Some Experiments
This is a correction to R. B. Kearfott and S. Hongthong’s article [SIAM J. Optim., 16 (2005), pp. 418–433]. DOI. 10.1137/100816080 There are errors in column 4 (entitled “Und...
R. Baker Kearfott
CASES
2009
ACM
15 years 4 months ago
Tight WCRT analysis of synchronous C programs
Accurate estimation of the tick length of a synchronous program is essential for efficient and predictable implementations that are devoid of timing faults. The techniques to dete...
Partha S. Roop, Sidharta Andalam, Reinhard von Han...
BIBE
2007
IEEE
128views Bioinformatics» more  BIBE 2007»
15 years 3 months ago
QOMA2: Optimizing the alignment of many sequences
Abstract—We consider the problem of aligning multiple protein sequences with the goal of maximizing the SP (Sum-of-Pairs) score, when the number of sequences is large. The QOMA (...
Xu Zhang, Tamer Kahveci
ECRTS
2007
IEEE
15 years 3 months ago
Cache-Aware Timing Analysis of Streaming Applications
Of late, there has been a considerable interest in models, algorithms and methodologies specifically targeted towards designing hardware and software for streaming applications. ...
Samarjit Chakraborty, Tulika Mitra, Abhik Roychoud...
IMC
2005
ACM
15 years 3 months ago
The Power of Slicing in Internet Flow Measurement
Flow measurement evolved into the primary method for measuring the composition of Internet traffic. Large ISPs and small networks use it to track dominant applications, dominant ...
Ramana Rao Kompella, Cristian Estan