Sciweavers

766 search results - page 134 / 154
» Detecting modifications in paper documents: a coding approac...
Sort
View
COMPSAC
2010
IEEE
13 years 5 months ago
Using Load Tests to Automatically Compare the Subsystems of a Large Enterprise System
Enterprise systems are load tested for every added feature, software updates and periodic maintenance to ensure that the performance demands on system quality, availability and res...
Haroon Malik, Bram Adams, Ahmed E. Hassan, Parmind...
DASC
2006
IEEE
14 years 1 months ago
On Recognizing Virtual Honeypots and Countermeasures
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...
PPOPP
2003
ACM
14 years 1 months ago
Compactly representing parallel program executions
Collecting a program’s execution profile is important for many reasons: code optimization, memory layout, program debugging and program comprehension. Path based execution pro...
Ankit Goel, Abhik Roychoudhury, Tulika Mitra
ECSA
2011
Springer
12 years 7 months ago
Architecture-Based Run-Time Fault Diagnosis
Abstract. An important step in achieving robustness to run-time faults is the ability to detect and repair problems when they arise in a running system. Effective fault detection a...
Paulo Casanova, Bradley R. Schmerl, David Garlan, ...
JFP
2000
163views more  JFP 2000»
13 years 7 months ago
Automatic useless-code elimination for HOT functional programs
In this paper we present two type inference systems for detecting useless-code in higher-order typed functional programs. Type inference can be performed in an efficient and compl...
Ferruccio Damiani, Paola Giannini