Sciweavers

526 search results - page 54 / 106
» date 2008
Sort
View
DSN
2008
IEEE
15 years 7 months ago
Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change
: Automated tools for understanding application behavior and its changes during the application life-cycle are essential for many performance analysis and debugging tasks. Applicat...
Ludmila Cherkasova, Kivanc M. Ozonat, Ningfang Mi,...
92
Voted
ISECS
2008
IEEE
15 years 7 months ago
Probability of Attack Based on System Vulnerability Life Cycle
—The proliferation of exploit codes greatly expedites attacks in cyber world. This research compiles important dates on vulnerability from various sources into five patterns of l...
Amontip Jumratjaroenvanit, Yunyong Teng-amnuay
82
Voted
SOCC
2008
IEEE
170views Education» more  SOCC 2008»
15 years 7 months ago
A higher-order mismatch-shaping method for multi-bit Sigma-Delta Modulators
—Mismatch-shaping Dynamic Element Matching (DEM) methods are extensively used in multi-bit Sigma-Delta Modulators (SDM) to reduce the effects of element mismatches. To date, only...
Alexander Lavzin, Mücahit Kozak, Eby G. Fried...
AFRICACRYPT
2008
Springer
15 years 2 months ago
An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol Based on Merkle Trees
Proof-of-work schemes are economic measures to deter denial-of-service attacks: service requesters compute moderately hard functions the results of which are easy to check by the ...
Fabien Coelho
AGILEDC
2008
IEEE
15 years 2 months ago
Automated Acceptance Testing: A Literature Review and an Industrial Case Study
Automated acceptance testing is a quite recent addition to testing in agile software development holding great promise of improving communication and collaboration. This paper sum...
Børge Haugset, Geir Kjetil Hanssen