Sciweavers

1629 search results - page 179 / 326
» Infeasible Code Detection
Sort
View
KDD
2009
ACM
232views Data Mining» more  KDD 2009»
16 years 2 months ago
Classification of software behaviors for failure detection: a discriminative pattern mining approach
Software is a ubiquitous component of our daily life. We often depend on the correct working of software systems. Due to the difficulty and complexity of software systems, bugs an...
David Lo, Hong Cheng, Jiawei Han, Siau-Cheng Khoo,...
RECOMB
2008
Springer
16 years 1 months ago
Integrating Sequence and Topology for Efficient and Accurate Detection of Horizontal Gene Transfer
Abstract. One phylogeny-based approach to horizontal gene transfer (HGT) detection entails comparing the topology of a gene tree to that of the species tree, and using their differ...
Cuong Than, Guohua Jin, Luay Nakhleh
ICC
2008
IEEE
125views Communications» more  ICC 2008»
15 years 8 months ago
Iteratively Detected Sphere Packing Modulated OFDM: An Exit Chart Perspective
- A novel iteratively detected Sphere Packing (SP) modulation aided Orthogonal Frequency Division Multiplexing (OFDM) scheme is proposed, which we refer to as the SPOFDM arrangemen...
Lei Xu, Mohammed El-Hajjar, Osamah Alamri, Sheng C...
ICC
2007
IEEE
110views Communications» more  ICC 2007»
15 years 8 months ago
Distributed Early Worm Detection Based on Payload Histograms
— Epidemic worms has become a social problem owing to their potency in paralyzing the Internet, thus affecting our way of life. Recent researches have pointed out that epidemic w...
Yuji Waizumi, Masashi Tsuji, Hiroshi Tsunoda, Nirw...
IEEEPACT
2006
IEEE
15 years 7 months ago
Self-checking instructions: reducing instruction redundancy for concurrent error detection
With reducing feature size, increasing chip capacity, and increasing clock speed, microprocessors are becoming increasingly susceptible to transient (soft) errors. Redundant multi...
Sumeet Kumar, Aneesh Aggarwal