Sciweavers

698 search results - page 54 / 140
» Evaluating Key Statements Analysis
Sort
View
102
Voted
AIPS
2004
15 years 4 months ago
Task Swapping for Schedule Improvement: A Broader Analysis
In this paper we analyze and extend a recently developed "task-swapping procedure" for improving schedules in oversubscribed situations. In such situations, there are ta...
Laurence A. Kramer, Stephen F. Smith
114
Voted
PDPTA
2000
15 years 4 months ago
On the application of accelerating simulation methods in network analysis
When evaluating quantitative aspects of communication networks using simulation, one of the main difficulties to face is the often considerable computing power required. In some s...
José Incera, Gerardo Rubino, Nicolás...
118
Voted
EOR
2007
102views more  EOR 2007»
15 years 2 months ago
Sub-stochastic matrix analysis for bounds computation - Theoretical results
Performance evaluation of complex systems is a critical issue and bounds computation provides confidence about service quality, reliability, etc. of such systems. The stochastic ...
Serge Haddad, Patrice Moreaux
124
Voted
CSMR
1999
IEEE
15 years 7 months ago
Impact of Function Pointers on the Call Graph
Maintenance activities are made more difficult when pointers are heavily used in source code: the programmer needs to build a mental model of memory locations and of the way they ...
Giuliano Antoniol, F. Calzolari, Paolo Tonella
122
Voted
IJNSEC
2007
125views more  IJNSEC 2007»
15 years 2 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang