Sciweavers

2232 search results - page 234 / 447
» A Scalable Approach to MPI Application Performance Analysis
Sort
View
ET
2002
108views more  ET 2002»
15 years 4 months ago
Diagnosis Strategies for Hardware or Software Systems
In this paper we explore two alternative approaches to system diagnosis. The first strategy is based on testability analysis performed by SATAN tool. The second approach performed ...
Maisaa Khalil, Chantal Robach, Franc Novak
NDSS
2008
IEEE
15 years 10 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
ACSAC
2006
IEEE
15 years 10 months ago
Static Detection of Vulnerabilities in x86 Executables
In the last few years, several approaches have been proposed to perform vulnerability analysis of applications written in high-level languages. However, little has been done to au...
Marco Cova, Viktoria Felmetsger, Greg Banks, Giova...
124
Voted
ICDCSW
2007
IEEE
15 years 10 months ago
UBCA: Utility-Based Clustering Architecture for Peer-to-Peer Systems
Peer-to-Peer (P2P) systems are currently used in a variety of applications. File sharing applications and ad hoc networking have fueled the usage of these systems. P2P systems gen...
Brent Lagesse, Mohan Kumar
KDD
2005
ACM
107views Data Mining» more  KDD 2005»
15 years 10 months ago
Cross-relational clustering with user's guidance
Clustering is an essential data mining task with numerous applications. However, data in most real-life applications are high-dimensional in nature, and the related information of...
Xiaoxin Yin, Jiawei Han, Philip S. Yu