Sciweavers

1548 search results - page 295 / 310
» Estimating Software Vulnerabilities
Sort
View
BIBE
2008
IEEE
203views Bioinformatics» more  BIBE 2008»
15 years 3 months ago
A study of the parameters affecting minimum detectable activity concentration level of clinical LSO PET scanners
— Recent studies in the field of molecular imaging have demonstrated the need for PET probes capable of imaging very weak activity distributions. Over this range of applications ...
Nicolas A. Karakatsanis, Konstantina S. Nikita
IPPS
2008
IEEE
15 years 3 months ago
Model-based fault localization in large-scale computing systems
We propose a new fault localization technique for software bugs in large-scale computing systems. Our technique always collects per-process function call traces of a target system...
Naoya Maruyama, Satoshi Matsuoka
IOLTS
2007
IEEE
155views Hardware» more  IOLTS 2007»
15 years 3 months ago
On Derating Soft Error Probability Based on Strength Filtering
— Soft errors caused by ionizing radiation have emerged as a major concern for current generation of CMOS technologies and the trend is expected to get worse. A significant frac...
Alodeep Sanyal, Sandip Kundu
87
Voted
IPPS
2007
IEEE
15 years 3 months ago
Invited Paper: A Compile-time Cost Model for OpenMP
OpenMP has gained wide popularity as an API for parallel programming on shared memory and distributed shared memory platforms. It is also a promising candidate to exploit the emer...
Chunhua Liao, Barbara M. Chapman
EMSOFT
2007
Springer
15 years 3 months ago
A communication synthesis infrastructure for heterogeneous networked control systems and its application to building automation
In networked control systems the controller of a physicallydistributed plant is implemented as a collection of tightlyinteracting, concurrent processes running on a distributed ex...
Alessandro Pinto, Luca P. Carloni, Alberto L. Sang...