Sciweavers

1030 search results - page 154 / 206
» Partial Detectability Profiles
Sort
View
STORAGESS
2005
ACM
15 years 5 months ago
An electric fence for kernel buffers
Improper access of data buffers is one of the most common errors in programs written in assembler, C, C++, and several other languages. Existing programs and OSs frequently acces...
Nikolai Joukov, Aditya Kashyap, Gopalan Sivathanu,...
POLICY
2005
Springer
15 years 5 months ago
Policy Conflict Analysis for Quality of Service Management
Policy-based management provides the ability to (re-)configure differentiated services networks so that desired Quality of Service (QoS) goals are achieved. Relevant configuration...
Marinos Charalambides, Paris Flegkas, George Pavlo...
CODES
2004
IEEE
15 years 3 months ago
Operation tables for scheduling in the presence of incomplete bypassing
Register bypassing is a powerful and widely used feature in modern processors to eliminate certain data hazards. Although complete bypassing is ideal for performance, bypassing ha...
Aviral Shrivastava, Eugene Earlie, Nikil D. Dutt, ...
BMCBI
2010
102views more  BMCBI 2010»
14 years 11 months ago
Identification of recurrent regions of copy-number variants across multiple individuals
Background: Algorithms and software for CNV detection have been developed, but they detect the CNV regions sample-by-sample with individual-specific breakpoints, while common CNV ...
Teo Shu Mei, Agus Salim, Stefano Calza, Ku Chee Se...
SAC
2011
ACM
14 years 2 months ago
An empirical study on the effectiveness of time-aware test case prioritization techniques
Regression testing is often performed with a time budget and it does not allow executing all test cases. Test case prioritization techniques re-order test cases to increase the ra...
Dongjiang You, Zhenyu Chen, Baowen Xu, Bin Luo, Ch...