Sciweavers

683 search results - page 34 / 137
» Vulnerability Analysis of High Dimensional Complex Systems
Sort
View
118
Voted
ISQED
2010
IEEE
151views Hardware» more  ISQED 2010»
15 years 7 months ago
Leakage temperature dependency modeling in system level analysis
Abstract— As the semiconductor technology continues its marching toward the deep sub-micron domain, the strong relation between leakage current and temperature becomes critical i...
Huang Huang, Gang Quan, Jeffrey Fan
126
Voted
HCW
2000
IEEE
15 years 5 months ago
Heterogeneity as Key Feature of High Performance Computing: the PQE1 Prototype
In this work we present the results of a project aimed at assembling an hybrid massively parallel machine, the PQE1 prototype, devoted to the simulation of complex physical models...
Paolo Palazzari, Lidia Arcipiani, Massimo Celino, ...
115
Voted
HPCA
2005
IEEE
16 years 28 days ago
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Datab...
Feng Qin, Shan Lu, Yuanyuan Zhou
ACSAC
2003
IEEE
15 years 4 months ago
A Stateful Intrusion Detection System for World-Wide Web Servers
Web servers are ubiquitous, remotely accessible, and often misconfigured. In addition, custom web-based applications may introduce vulnerabilities that are overlooked even by the ...
Giovanni Vigna, William K. Robertson, Vishal Kher,...
108
Voted
BMCBI
2010
170views more  BMCBI 2010»
15 years 20 days ago
Integrative analysis of gene expression and copy number alterations using canonical correlation analysis
Background: With the rapid development of new genetic measurement methods, several types of genetic alterations can be quantified in a high-throughput manner. While the initial fo...
Charlotte Soneson, Henrik Lilljebjörn, Thoas ...