Sciweavers

828 search results - page 50 / 166
» A New Model of Program Dependences for Reverse Engineering
Sort
View
RAID
1999
Springer
14 years 1 months ago
Combining Knowledge Discovery and Knowledge Engineering to Build IDSs
We have been developing a data mining (i.e., knowledge discovery) framework, MADAM ID, for Mining Audit Data for Automated Models for Intrusion Detection [LSM98, LSM99b, LSM99a]. ...
Wenke Lee, Salvatore J. Stolfo
TCAD
2010
88views more  TCAD 2010»
13 years 3 months ago
Stress Aware Layout Optimization Leveraging Active Area Dependent Mobility Enhancement
Starting from the 90nm technology node, process induced stress has played a key role in the design of highperformance devices. The emergence of source/drain silicon germanium (S/D ...
Ashutosh Chakraborty, Sean X. Shi, David Z. Pan
EMSOFT
2003
Springer
14 years 2 months ago
Intelligent Editor for Writing Worst-Case-Execution-Time-Oriented Programs
Abstract. To guarantee timeliness in hard real-time systems the knowledge of the worst-case execution time (WCET) for its time-critical tasks is mandatory. Accurate and correct WCE...
Janosch Fauster, Raimund Kirner, Peter P. Puschner
AGILEDC
2004
IEEE
14 years 22 days ago
An Initial Exploration of the Relationship Between Pair Programming and Brooks' Law
Through his law, "adding manpower to a late software project makes it later," Brooks asserts that the assimilation, training, and intercommunication costs of adding new ...
Laurie A. Williams, Anuja Shukla, Annie I. Ant&oac...
ISSRE
2002
IEEE
14 years 1 months ago
Inter-Class Mutation Operators for Java
The effectiveness of mutation testing depends heavily on the types of faults that the mutation operators are designed to represent. Therefore, the quality of the mutation operator...
Yu-Seung Ma, Yong Rae Kwon, Jeff Offutt