Sciweavers

1624 search results - page 207 / 325
» Integrating Fault-Tolerant Techniques into the Design of Cri...
Sort
View
NOMS
2010
IEEE
228views Communications» more  NOMS 2010»
14 years 9 months ago
DA VINCI: A tool to improve VoIP call routing configurations
As IP telephony becomes a critical part of the enterprise network infrastructure, there is an increasing need for tools to help manage VoIP systems. In this paper, we introduce DA ...
Kunwadee Sripanidkulchai, Shu Tao, Zon-Yin Shae
VTS
2000
IEEE
99views Hardware» more  VTS 2000»
15 years 3 months ago
Virtual Scan Chains: A Means for Reducing Scan Length in Cores
A novel design-for-test (DFT) technique is presented for designing a core with a “virtual scan chain” which looks (to the system integrator) like it is shorter than the real s...
Abhijit Jas, Bahram Pouya, Nur A. Touba
88
Voted
ACSAC
2009
IEEE
15 years 5 months ago
Protecting Commodity Operating System Kernels from Vulnerable Device Drivers
Device drivers on commodity operating systems execute with kernel privilege and have unfettered access to kernel data structures. Several recent attacks demonstrate that such poor...
Shakeel Butt, Vinod Ganapathy, Michael M. Swift, C...
MODELS
2009
Springer
15 years 3 months ago
SLIM - A Lightweight Environment for Synchronous Collaborative Modeling
Abstract. UML diagrams have become the de-facto standard for the visual modeling of software systems. The creation and discussion of these diagrams is a critical factor impacting t...
Christian Thum, Michael Schwind, Martin Schader
IEEEVAST
2010
14 years 5 months ago
Anomaly detection in GPS data based on visual analytics
Modern machine learning techniques provide robust approaches for data-driven modeling and critical information extraction, while human experts hold the advantage of possessing hig...
Zicheng Liao, Yizhou Yu, Baoquan Chen