Sciweavers

1636 search results - page 14 / 328
» Detecting similar software applications
Sort
View
SC
2000
ACM
14 years 28 days ago
Dynamic Software Testing of MPI Applications with Umpire
As evidenced by the popularity of MPI (Message Passing Interface), message passing is an effective programming technique for managing coarse-grained concurrency on distributed com...
Jeffrey S. Vetter, Bronis R. de Supinski
CASES
2008
ACM
13 years 10 months ago
Multi-granularity sampling for simulating concurrent heterogeneous applications
Detailed or cycle-accurate/bit-accurate (CABA) simulation is a critical phase in the design flow of embedded systems. However, with increasing system complexity, full detailed sim...
Melhem Tawk, Khaled Z. Ibrahim, Smaïl Niar
SRDS
1997
IEEE
14 years 23 days ago
Software Approach to Hazard Detection Using On-line Analysis of Safety Constraints
Hazard situations in safety-critical systems are typically complex, so there is a need for means to detect complex hazards and react in a timely and meaningful way. This paper add...
Beth A. Schroeder, Karsten Schwan, Sudhir Aggarwal
ICIP
2001
IEEE
14 years 10 months ago
Scene boundary detection via video self-similarity analysis
In this paper, we present a novel framework for analyzing video using self-similarity. Video scenes are located by analyzing inter-frame similarity matrices. The approach is flexi...
Matthew L. Cooper, Jonathan Foote
IEEEARES
2010
IEEE
14 years 27 days ago
Configuration Fuzzing for Software Vulnerability Detection
Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations of the software together with its particular runtime environ...
Huning Dai, Christian Murphy, Gail E. Kaiser