Sciweavers

15781 search results - page 3063 / 3157
» Evaluating Information Extraction
Sort
View
128
Voted
IPCCC
2006
IEEE
15 years 9 months ago
Connectionless port scan detection on the backbone
Considerable research has been done on detecting and blocking portscan activities that are typically conducted by infected hosts to discover other vulnerable hosts. However, the f...
Avinash Sridharan, Tao Ye, Supratik Bhattacharyya
143
Voted
LCN
2006
IEEE
15 years 9 months ago
Utility-based Packet Scheduler for Wireless Communications
Abstract— Following widespread availability of wireless Internet, a wide range of applications with differing QoS requirements must share the wireless access. The objective of th...
Ana Aguiar, Adam Wolisz, Horst Lederer
128
Voted
MICRO
2006
IEEE
117views Hardware» more  MICRO 2006»
15 years 9 months ago
PathExpander: Architectural Support for Increasing the Path Coverage of Dynamic Bug Detection
Dynamic software bug detection tools are commonly used because they leverage run-time information. However, they suffer from a fundamental limitation, the Path Coverage Problem: t...
Shan Lu, Pin Zhou, Wei Liu, Yuanyuan Zhou, Josep T...
129
Voted
SAINT
2006
IEEE
15 years 9 months ago
Fluid-Based Analysis of a Network with DCCP Connections and RED Routers
In this paper, we model DCCP congestion control mechanism and RED as independent discrete-time systems using fluid-flow approximation. By interconnecting DCCP connections and RE...
Hiroyuki Hisamatsu, Hiroyuki Ohsaki, Masayuki Mura...
128
Voted
SCAM
2006
IEEE
15 years 9 months ago
Bug Classification Using Program Slicing Metrics
In this paper, we introduce 13 program slicing metrics for C language programs. These metrics use program slice information to measure the size, complexity, coupling, and cohesion...
Kai Pan, Sunghun Kim, E. James Whitehead Jr.
« Prev « First page 3063 / 3157 Last » Next »