Sciweavers

1136 search results - page 80 / 228
» Finding Small Holes
Sort
View
EUROMICRO
2005
IEEE
14 years 2 months ago
Software Security Analysis - Execution Phase Audit
Code revision of a leading telecom product was performed, combining manual audit and static analysis tools. On average, one exploitable vulnerability was found for every 4000 line...
Bengt Carlsson, Dejan Baca
WAIM
2004
Springer
14 years 2 months ago
Learning-Based Top-N Selection Query Evaluation over Relational Databases
A top-N selection query against a relation is to find the N tuples that satisfy the query condition the best but not necessarily completely. In this paper, we propose a new method ...
Liang Zhu, Weiyi Meng
INFOCOM
1999
IEEE
14 years 1 months ago
Performance Characteristics of Mirror Servers on the Internet
Abstract--As a growing number of web sites introduce mirrors to increase throughput, the challenge for clients becomes determining which mirror will offer the best performance when...
Andy Myers, Peter A. Dinda, Hui Zhang
IPPS
1999
IEEE
14 years 1 months ago
GA-Based Parallel Image Registration on Parallel Clusters
Genetic Algorithms (GAs) have been known to be robust for search and optimization problems. Image registration can take advantage of the robustness of GAs in finding best transform...
Prachya Chalermwat, Tarek A. El-Ghazawi, Jacquelin...
FPGA
1999
ACM
142views FPGA» more  FPGA 1999»
14 years 1 months ago
Multi-Terminal Net Routing for Partial Crossbar-Based Multi-FPGA Systems
Multi-FPGA systems are used as custom computing machines to solve compute intensive problems and also in the verification and prototyping of large circuits. In this paper, we addr...
Abdel Ejnioui, N. Ranganathan