Sciweavers

4196 search results - page 649 / 840
» Supporting the development of network programs
Sort
View
DSN
2000
IEEE
15 years 8 months ago
Testing for Software Vulnerability Using Environment Perturbation
We describe an methodology for testing a software system for possible security flaws. Based on the observation that most security flaws are caused by the program’s inappropria...
Wenliang Du, Aditya P. Mathur
151
Voted
IADIS
2003
15 years 5 months ago
A Mobile Agent Based Registration System
A mobile agent is a software agent that has the ability to transfer its program code, data and execution state across a network to a remote computer for execution. In this paper, ...
K. K. Wong, C. K. Heng, P. C. Leong, Ma-Tit Yap
131
Voted
PDPTA
2003
15 years 5 months ago
Distop: A Low-Overhead Cluster Monitoring System
Current systems for managing workload on clusters of workstations, particularly those available for Linux-based (Beowulf) clusters, are typically based on traditional process-base...
Daniel Andresen, Nathan Schopf, Ethan Bowker, Timo...
152
Voted
ISLPED
2010
ACM
153views Hardware» more  ISLPED 2010»
15 years 4 months ago
Leakage minimization using self sensing and thermal management
We have developed a system architecture, measuring and modeling techniques, and algorithms for on-line power and energy optimization and thermal management. The starting point for...
Alireza Vahdatpour, Miodrag Potkonjak
140
Voted
BIOSYSTEMS
2007
115views more  BIOSYSTEMS 2007»
15 years 3 months ago
Evolving fuzzy rules to model gene expression
This paper develops an algorithm that extracts explanatory rules from microarray data, which we treat as time series, using genetic programming (GP) and fuzzy logic. Reverse polis...
Ricardo Linden, Amit Bhaya