Sciweavers

1492 search results - page 211 / 299
» Testing Properties of Constraint-Graphs
Sort
View
ASPLOS
2006
ACM
15 years 10 months ago
HeapMD: identifying heap-based bugs using anomaly detection
We present the design, implementation, and evaluation of HeapMD, a dynamic analysis tool that finds heap-based bugs using anomaly detection. HeapMD is based upon the observation ...
Trishul M. Chilimbi, Vinod Ganapathy
SIGMETRICS
2006
ACM
116views Hardware» more  SIGMETRICS 2006»
15 years 10 months ago
Applying architectural vulnerability Analysis to hard faults in the microprocessor
In this paper, we present a new metric, Hard-Fault Architectural Vulnerability Factor (H-AVF), to allow designers to more effectively compare alternate hard-fault tolerance scheme...
Fred A. Bower, Derek Hower, Mahmut Yilmaz, Daniel ...
129
Voted
WOWMOM
2006
ACM
111views Multimedia» more  WOWMOM 2006»
15 years 10 months ago
An Experimental Testbed and Methodology for Characterizing IEEE 802.11 Network Cards
— It has been observed that IEEE 802.11 commercial cards produced by different vendors show a different behavior in terms of perceived throughput or access delay. Performance dif...
Antonio Di Stefano, Giovanni Terrazzino, Luca Scal...
129
Voted
CEC
2005
IEEE
15 years 9 months ago
Improvements to the scalability of multiobjective clustering
In previous work, we have proposed a novel approach to data clustering based on the explicit optimization of a partitioning with respect to two complementary clustering objectives ...
Julia Handl, Joshua D. Knowles
CSB
2005
IEEE
115views Bioinformatics» more  CSB 2005»
15 years 9 months ago
A New Clustering Strategy with Stochastic Merging and Removing Based on Kernel Functions
With hierarchical clustering methods, divisions or fusions, once made, are irrevocable. As a result, when two elements in a bottom-up algorithm are assigned to one cluster, they c...
Huimin Geng, Hesham H. Ali