Sciweavers

480 search results - page 36 / 96
» A practical bottleneck detection method
Sort
View
SIGSOFT
2003
ACM
14 years 11 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler
ESWS
2009
Springer
14 years 4 months ago
Ontology Integration Using Mappings: Towards Getting the Right Logical Consequences
Abstract. We propose a general method and novel algorithmic techniques to facilitate the integration of independently developed ontologies using mappings. Our method and techniques...
Ernesto Jiménez-Ruiz, Bernardo Cuenca Grau,...
AVSS
2005
IEEE
14 years 3 months ago
Performance evaluation of event detection solutions: the CREDS experience
In video surveillance projects, automatic and realtime event detection solutions are required to guarantee an efficient and cost-effective use of the infrastructure. Many solution...
Francesco Ziliani, Sergio A. Velastin, Fatih Porik...
GLOBECOM
2009
IEEE
14 years 2 months ago
Searching in the Delta Lattice: An Efficient MIMO Detection for Iterative Receivers
This paper introduces a new framework of the multiple-input multiple-output (MIMO) detection in iterative receivers. Unlike the conventional methods processing with symbol lattice,...
I-Wei Lai, Chun-Hao Liao, Ernst Martin Witte, Davi...
SAC
2010
ACM
14 years 5 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...