Sciweavers

6590 search results - page 1271 / 1318
» Evaluating the performance engineering process
Sort
View
CCS
2010
ACM
13 years 10 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
ICECCS
2010
IEEE
219views Hardware» more  ICECCS 2010»
13 years 10 months ago
Comparison of Six Ways to Extend the Scope of Cheddar to AADL v2 with Osate
Abstract—Cheddar is a framework dedicated to the specification of real-time schedulers, and to their analysis by simulation. It is developed in Ada. Some parts of its modular ar...
Mickaël Kerboeuf, Alain Plantec, Frank Singho...
BMCBI
2008
118views more  BMCBI 2008»
13 years 10 months ago
DOVIS: an implementation for high-throughput virtual screening using AutoDock
Background: Molecular-docking-based virtual screening is an important tool in drug discovery that is used to significantly reduce the number of possible chemical compounds to be i...
Shuxing Zhang, Kamal Kumar, Xiaohui Jiang, Anders ...
ESWA
2008
151views more  ESWA 2008»
13 years 10 months ago
Automated diagnosis of sewer pipe defects based on machine learning approaches
In sewage rehabilitation planning, closed circuit television (CCTV) systems are the widely used inspection tools in assessing sewage structural conditions for non man entry pipes....
Ming-Der Yang, Tung-Ching Su
CN
2006
109views more  CN 2006»
13 years 10 months ago
Quality of service provisioning for composable routing elements
Quality of service (QoS) provisioning for dynamically composable software elements in a programmable router has not received much attention. We present a router platform that supp...
Seung Chul Han, Puneet Zaroo, David K. Y. Yau, Yu ...
« Prev « First page 1271 / 1318 Last » Next »