Sciweavers

694 search results - page 14 / 139
» Evaluating Multilanguage-Comparability of Subjectivity Analy...
Sort
View
EMSOFT
2006
Springer
14 years 29 days ago
Modeling a system controller for timing analysis
Upper bounds on worst-case execution times, which are commonly called WCET, are a prerequisite for validating the temporal correctness of tasks in a real-time system. Due to the e...
Stephan Thesing
ASPLOS
2006
ACM
14 years 3 months ago
ExecRecorder: VM-based full-system replay for attack analysis and system recovery
Log-based recovery and replay systems are important for system reliability, debugging and postmortem analysis/recovery of malware attacks. These systems must incur low space and p...
Daniela A. S. de Oliveira, Jedidiah R. Crandall, G...
SIGMOD
2007
ACM
166views Database» more  SIGMOD 2007»
14 years 9 months ago
Threats to privacy in the forensic analysis of database systems
The use of any modern computer system leaves unintended traces of expired data and remnants of users' past activities. In this paper, we investigate the unintended persistenc...
Patrick Stahlberg, Gerome Miklau, Brian Neil Levin...
ATAL
2009
Springer
14 years 3 months ago
Graph-based methods for the analysis of large-scale multiagent systems
Multiagent systems are often characterized by complex, and sometimes unpredictable interactions amongst their autonomous components. While these systems can provide robust and sca...
Wilbur Peng, William Krueger, Alexander Grushin, P...
PIMRC
2008
IEEE
14 years 3 months ago
Carrier frequency dependent throughput analysis for impaired OFDM links under user mobility
—In this paper we present an analytical approach to evaluate the M-QAM bit error rate and carrier frequency dependent throughput of OFDM systems subject to various receiver impai...
Marco Krondorf, Gerhard Fettweis