Sciweavers

12745 search results - page 2382 / 2549
» Automating test automation
Sort
View
ICS
2009
Tsinghua U.
15 years 10 months ago
Performance modeling and automatic ghost zone optimization for iterative stencil loops on GPUs
Iterative stencil loops (ISLs) are used in many applications and tiling is a well-known technique to localize their computation. When ISLs are tiled across a parallel architecture...
Jiayuan Meng, Kevin Skadron
KDD
2009
ACM
188views Data Mining» more  KDD 2009»
15 years 10 months ago
BGP-lens: patterns and anomalies in internet routing updates
The Border Gateway Protocol (BGP) is one of the fundamental computer communication protocols. Monitoring and mining BGP update messages can directly reveal the health and stabilit...
B. Aditya Prakash, Nicholas Valler, David Andersen...
132
Voted
COMPSAC
2009
IEEE
15 years 10 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz
CSIE
2009
IEEE
15 years 10 months ago
Identifying DNA Strands Using a Kernel of Classified Sequences
— Automated DNA sequencing produces a large amount of raw DNA sequence data that then needs to be classified, organized, and annotation. One major application is the comparison o...
Guillermo Tonsmann, David D. Pollock, Wanjun Gu, T...
DATE
2009
IEEE
116views Hardware» more  DATE 2009»
15 years 10 months ago
An MDE methodology for the development of high-integrity real-time systems
—This paper reports on experience gained and lessons learned from an intensive investigation of model-driven engineering methodology and technology for application to high-integr...
Silvia Mazzini, Stefano Puri, Tullio Vardanega
« Prev « First page 2382 / 2549 Last » Next »