Sciweavers

889 search results - page 63 / 178
» General Conclusions
Sort
View
CACM
2011
96views more  CACM 2011»
14 years 6 months ago
Why STM can be more than a research toy
Software Transactional Memory (STM) promises to simplify concurrent programming without requiring specific hardware support. Yet, STM’s credibility lies on the extent to which ...
Aleksandar Dragojevic, Pascal Felber, Vincent Gram...
ISSTA
2012
ACM
13 years 2 months ago
Isolating failure causes through test case generation
Manual debugging is driven by experiments—test runs that narrow down failure causes by systematically confirming or excluding individual factors. The BUGEX approach leverages t...
Jeremias Röbetaler, Gordon Fraser, Andreas Ze...
INFOCOM
2005
IEEE
15 years 5 months ago
Bayesian packet loss detection for TCP
— One of TCP’s critical tasks is to determine which packets are lost in the network, as a basis for control actions (flow control and packet retransmission). Modern TCP implem...
Nahur Fonseca, Mark Crovella
CCS
2008
ACM
15 years 1 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig
BMCBI
2004
165views more  BMCBI 2004»
14 years 11 months ago
Analysis of oligonucleotide array experiments with repeated measures using mixed models
Background: Two or more factor mixed factorial experiments are becoming increasingly common in microarray data analysis. In this case study, the two factors are presence (Patients...
Hao Li, Constance L. Wood, Thomas V. Getchell, Mar...