Sciweavers

3667 search results - page 58 / 734
» Software Rejuvenation - Modeling and Analysis
Sort
View
SRDS
1997
IEEE
15 years 4 months ago
Software Approach to Hazard Detection Using On-line Analysis of Safety Constraints
Hazard situations in safety-critical systems are typically complex, so there is a need for means to detect complex hazards and react in a timely and meaningful way. This paper add...
Beth A. Schroeder, Karsten Schwan, Sudhir Aggarwal
CRV
2006
IEEE
92views Robotics» more  CRV 2006»
15 years 5 months ago
Simple Software for Microarray Image Analysis
A set of microarray images were acquired by a sequence of biological experiments which were scanned via a high resolution scanner. For each spot corresponding to a gene, the ratio...
Chaur-Chin Chen, Cheng-Yan Kao, Chun-Fan Chang, Hs...
SIGMETRICS
2004
ACM
106views Hardware» more  SIGMETRICS 2004»
15 years 5 months ago
Performance analysis of BSTs in system software
Binary search tree (BST) based data structures, such as AVL trees, red-black trees, and splay trees, are often used in system software, such as operating system kernels. Choosing ...
Ben Pfaff
MSE
2002
IEEE
135views Hardware» more  MSE 2002»
15 years 4 months ago
The Impact of SMT/SMP Designs on Multimedia Software Engineering - A Workload Analysis Study
This paper presents the study of running several core multimedia applications on a simultaneous multithreading (SMT) architecture and derives design principles for multimedia soft...
Yen-Kuang Chen, Rainer Lienhart, Eric Debes, Matth...
DAC
1995
ACM
15 years 3 months ago
Performance Analysis of Embedded Software Using Implicit Path Enumeration
—Embedded computer systems are characterized by the presence of a processor running application-specific dedicated software. A large number of these systems must satisfy real-ti...
Yau-Tsun Steven Li, Sharad Malik