Sciweavers

84 search results - page 10 / 17
» A Technique for Enabling and Supporting Debugging of Field F...
Sort
View
NETWORK
2008
102views more  NETWORK 2008»
13 years 7 months ago
Behavior and classification of NAT devices and implications for NAT traversal
Abstract--For a long time, traditional client-server communication was the predominant communication paradigm of the Internet. Network Address Translation devices (NAT) emerged to ...
Andreas Müller, Georg Carle, Andreas Klenk
ESWA
2006
114views more  ESWA 2006»
13 years 7 months ago
Bankruptcy prediction with neural logic networks by means of grammar-guided genetic programming
The paper demonstrates the efficient use of hybrid intelligent systems for solving the classification problem of bankruptcy. The aim of the study is to obtain classification schem...
Athanasios Tsakonas, Georgios Dounias, Michael Dou...
CASES
2005
ACM
13 years 9 months ago
Segment protection for embedded systems using run-time checks
The lack of virtual memory protection is a serious source of unreliability in many embedded systems. Without the segment-level protection it provides, these systems are subject to...
Matthew Simpson, Bhuvan Middha, Rajeev Barua
AMAST
2006
Springer
13 years 11 months ago
State Space Representation for Verification of Open Systems
Abstract. When designing an open system, there might be no implementation available for certain components at verification time. For such systems, verification has to be based on a...
Irem Aktug, Dilian Gurov
ASPLOS
2008
ACM
13 years 10 months ago
SoftSig: software-exposed hardware signatures for code analysis and optimization
Many code analysis techniques for optimization, debugging, or parallelization need to perform runtime disambiguation of sets of addresses. Such operations can be supported efficie...
James Tuck, Wonsun Ahn, Luis Ceze, Josep Torrellas