Sciweavers

1863 search results - page 95 / 373
» Load-Reuse Analysis: Design and Evaluation
Sort
View
ISSTA
2012
ACM
13 years 17 days ago
Measuring enforcement windows with symbolic trace interpretation: what well-behaved programs say
A static analysis design is sufficient if it can prove the property of interest with an acceptable number of false alarms. Ultimately, the only way to confirm that an analysis d...
Devin Coughlin, Bor-Yuh Evan Chang, Amer Diwan, Je...
ICECCS
2002
IEEE
93views Hardware» more  ICECCS 2002»
15 years 3 months ago
Mnemosyne: Designing and Implementing Network Short-Term Memory
Network traffic logs play an important role in incident analysis. With the increasing throughput of network links, maintaining a complete log of all network activity has become a...
Giovanni Vigna, Andrew Mitchel
CHI
2002
ACM
15 years 10 months ago
Tangibly simple, architecturally complex: evaluating a tangible presentation aid
In this paper, we describe an evaluation of the Palette, a presentation tool that was reported at CHI '99. The Palette allows presenters to quickly access digital presentatio...
Elizabeth F. Churchill, Les Nelson
QSIC
2005
IEEE
15 years 3 months ago
A Preliminary Evaluation of Software Inspection Tools, with the DESMET Method
Software inspections are established means of ensuring quality in software engineering. The traditional paper-based inspections are considered too laborious for widespread usage, ...
Henrik Hedberg, Jouni Lappalainen
ESCIENCE
2006
IEEE
15 years 4 months ago
A Middleware Framework for Maximum Likelihood Evaluation over Dynamic Grids
We have designed a maximum likelihood fitter using the actor model to distribute the computation over a heterogeneous network. The prototype implementation uses the SALSA program...
Wei-Jen Wang, Kaoutar El Maghraoui, John Cummings,...