Sciweavers

2838 search results - page 337 / 568
» Verifying Controlled Components
Sort
View
103
Voted
IPPS
2007
IEEE
15 years 7 months ago
Stack Trace Analysis for Large Scale Debugging
We present the Stack Trace Analysis Tool (STAT) to aid in debugging extreme-scale applications. STAT can reduce problem exploration spaces from thousands of processes to a few by ...
Dorian C. Arnold, Dong H. Ahn, Bronis R. de Supins...
RSP
2007
IEEE
158views Control Systems» more  RSP 2007»
15 years 7 months ago
SPP-NIDS - A Sea of Processors Platform for Network Intrusion Detection Systems
A widely used approach to avoid network intrusion is SNORT, an open source Network Intrusion Detection System (NIDS). This work describes SPP-NIDS, a architecture for intrusion de...
Luis Carlos Caruso, Guilherme Guindani, Hugo Schmi...
120
Voted
VTC
2007
IEEE
158views Communications» more  VTC 2007»
15 years 7 months ago
Efficient Spatial Reuse in Multi-Radio, Multi-Hop Wireless Mesh Networks
— In the paper, we propose a novel scheduling mechanism without modifying the existing IEEE 802.11 MAC, called wireless Radio-Matching Protocol (RMP). It takes account of interfe...
Da-Ren Guo, Kuochen Wang, Lung-Sheng Lee
101
Voted
CC
2007
Springer
109views System Software» more  CC 2007»
15 years 7 months ago
Layout Transformations for Heap Objects Using Static Access Patterns
As the amount of data used by programs increases due to the growth of hardware storage capacity and computing power, efficient memory usage becomes a key factor for performance. Si...
Jinseong Jeon, Keoncheol Shin, Hwansoo Han
ESTIMEDIA
2007
Springer
15 years 7 months ago
Network Calculus Applied to Verification of Memory Access Performance in SoCs
SoCs for multimedia applications typically use only one port to off-chip DRAM for cost reasons. The sharing of interconnect and the off-chip DRAM port by several IP blocks makes t...
Tomas Henriksson, Pieter van der Wolf, Axel Jantsc...