Sciweavers

341 search results - page 9 / 69
» Empirical estimates of software availability of deployed sys...
Sort
View
ISF
2006
118views more  ISF 2006»
13 years 7 months ago
Does information security attack frequency increase with vulnerability disclosure? An empirical analysis
Abstract Research in information security, risk management and investment has grown in importance over the last few years. However, without reliable estimates on attack probabiliti...
Ashish Arora, Anand Nandkumar, Rahul Telang
ESEM
2009
ACM
14 years 2 months ago
Scope error detection and handling concerning software estimation models
Over the last 25+ years, the software community has been searching for the best models for estimating variables of interest (e.g., cost, defects, and fault proneness). However, li...
Salvatore Alessandro Sarcià, Victor R. Basi...
CASES
2003
ACM
14 years 22 days ago
Programming challenges in network processor deployment
Programming multi-processor ASIPs, such as network processors, remains an art due to the wide variety of architectures and due to little support for exploring different implement...
Chidamber Kulkarni, Matthias Gries, Christian Saue...
PIMRC
2008
IEEE
14 years 1 months ago
AuthScan: Enabling fast handoff across already deployed IEEE 802.11 wireless networks
Abstract—Handoff procedure in IEEE 802.11 wireless networks must be accomplished with as little interruption as possible to maintain the required quality of service (QoS). We hav...
Jaeouk Ok, Pedro Morales, Hiroyuki Morikawa
MICRO
2003
IEEE
125views Hardware» more  MICRO 2003»
14 years 23 days ago
Runtime Power Monitoring in High-End Processors: Methodology and Empirical Data
With power dissipation becoming an increasingly vexing problem across many classes of computer systems, measuring power dissipation of real, running systems has become crucial for...
Canturk Isci, Margaret Martonosi