Sciweavers

3901 search results - page 644 / 781
» software 2008
Sort
View
ICSE
2008
IEEE-ACM
16 years 4 months ago
Proposing SQL statement coverage metrics
An increasing number of cyber attacks are occurring at the application layer when attackers use malicious input. These input validation vulnerabilities can be exploited by (among ...
Ben H. Smith, Yonghee Shin, Laurie Williams
CODES
2008
IEEE
15 years 10 months ago
Intra- and inter-processor hybrid performance modeling for MPSoC architectures
The heterogeneity of modern MPSoC architectures, coupled with the increasing complexity of the applications mapped onto them has recently led to a lot of interest in hybrid perfor...
Frank E. B. Ophelders, Samarjit Chakraborty, Henk ...
CODES
2008
IEEE
15 years 10 months ago
Distributed flit-buffer flow control for networks-on-chip
The combination of flit-buffer flow control methods and latency-insensitive protocols is an effective solution for networks-on-chip (NoC). Since they both rely on backpressure...
Nicola Concer, Michele Petracca, Luca P. Carloni
CSSE
2008
IEEE
15 years 10 months ago
Stochastic Gradient Algorithm for Multi-input Systems Based on the Auxiliary Model
—This paper presents an auxiliary model based stochastic gradient parameter estimation algorithm for multiinput output-error systems by minimizing a quadratic cost function. The ...
Yuwu Liao, Xianfang Wang, Rui Feng Ding
ICSM
2008
IEEE
15 years 10 months ago
Retrieving relevant reports from a customer engagement repository
Customers of modern enterprise applications commonly engage the vendor of the application for onsite troubleshooting and fine tuning of large deployments. The results of these eng...
Dharmesh Thakkar, Zhen Ming Jiang, Ahmed E. Hassan...