Sciweavers

7742 search results - page 1473 / 1549
» The Robustness of Level Sets
Sort
View
RTCSA
2006
IEEE
15 years 6 months ago
Instruction Scheduling with Release Times and Deadlines on ILP Processors
ILP (Instruction Level Parallelism) processors are being increasingly used in embedded systems. In embedded systems, instructions may be subject to timing constraints. An optimisi...
Hui Wu, Joxan Jaffar, Jingling Xue
101
Voted
SCAM
2006
IEEE
15 years 6 months ago
Bug Classification Using Program Slicing Metrics
In this paper, we introduce 13 program slicing metrics for C language programs. These metrics use program slice information to measure the size, complexity, coupling, and cohesion...
Kai Pan, Sunghun Kim, E. James Whitehead Jr.
SIBGRAPI
2006
IEEE
15 years 6 months ago
Non-Extensive Entropy for CAD Systems of Breast Cancer Images
Recent statistics show that breast cancer is a major cause of death among women in all of the world. Hence, early diagnostic with Computer Aided Diagnosis (CAD) systems is a very ...
Paulo S. Rodrigues, Ruey-Feng Chang, Jasjit S. Sur...
TRIDENTCOM
2006
IEEE
15 years 6 months ago
Emulation versus simulation: A case study of TCP-targeted denial of service attacks
—In this paper, we investigate the applicability of simulation and emulation for denial of service (DoS) attack experimentation. As a case study, we consider low-rate TCP-targete...
Roman Chertov, Sonia Fahmy, Ness B. Shroff
97
Voted
WSE
2006
IEEE
15 years 6 months ago
Modeling Request Routing in Web Applications
For web applications, determining how requests from a web page are routed through server components can be time-consuming and error-prone due to the complex set of rules and mecha...
Minmin Han, Christine Hofmeister
« Prev « First page 1473 / 1549 Last » Next »