Sciweavers

2255 search results - page 339 / 451
» High Assurance Software Systems
Sort
View
IWNAS
2008
IEEE
15 years 11 months ago
A Novel Embedded Accelerator for Online Detection of Shrew DDoS Attacks
∗ As one type of stealthy and hard-to-detect attack, lowrate TCP-targeted DDoS attack can seriously throttle the throughput of normal TCP flows for a long time without being noti...
Hao Chen, Yu Chen
ECOOP
2007
Springer
15 years 11 months ago
Generational Real-Time Garbage Collection
Abstract. While real-time garbage collection is now available in production virtual machines, the lack of generational capability means applications with high allocation rates are ...
Daniel Frampton, David F. Bacon, Perry Cheng, Davi...
147
Voted
TELETRAFFIC
2007
Springer
15 years 11 months ago
Modeling and Predicting End-to-End Response Times in Multi-tier Internet Applications
Many Internet applications employ multi-tier software architectures. The performance of such multi-tier Internet applications is typically measured by the end-toend response times...
Sandjai Bhulai, Swaminathan Sivasubramanian, Rober...
126
Voted
SIGIR
2005
ACM
15 years 10 months ago
A geometric interpretation of r-precision and its correlation with average precision
We consider two of the most commonly cited measures of retrieval performance: average precision and R-precision. It is well known that average precision and R-precision are highly...
Javed A. Aslam, Emine Yilmaz, Virgiliu Pavlu
149
Voted
VLSI
2005
Springer
15 years 10 months ago
Combined Test Data Selection and Scheduling for Test Quality Optimization under ATE Memory Depth Constraint
1 The increasing test data volume required to ensure high test quality when testing a System-on-Chip is becoming a problem since it (the test data volume) must fit the ATE (Automa...
Erik Larsson, Stina Edbom