Sciweavers

4757 search results - page 151 / 952
» Generalized Posynomial Performance Modeling
Sort
View
ESEM
2008
ACM
15 years 4 months ago
An empirical model to predict security vulnerabilities using code complexity metrics
Complexity is often hypothesized to be the enemy of software security. If this hypothesis is true, complexity metrics may be used to predict the locale of security problems and ca...
Yonghee Shin, Laurie Williams
133
Voted
CCS
2010
ACM
15 years 1 months ago
Designs to account for trust in social network-based sybil defenses
Social network-based Sybil defenses exploit the trust exhibited in social graphs to detect Sybil nodes that disrupt an algorithmic property (i.e., the fast mixing) in these graphs...
Abedelaziz Mohaisen, Nicholas Hopper, Yongdae Kim
138
Voted
CLUSTER
2009
IEEE
15 years 6 days ago
MITHRA: Multiple data independent tasks on a heterogeneous resource architecture
With the advent of high-performance COTS clusters, there is a need for a simple, scalable and faulttolerant parallel programming and execution paradigm. In this paper, we show that...
Reza Farivar, Abhishek Verma, Ellick Chan, Roy H. ...
SIGOPS
2010
112views more  SIGOPS 2010»
15 years 23 days ago
QoS-oriented control of server systems
Multi-tier architectures are widely used by internet applications. Guaranteeing the performance, and more generally the quality of service (QoS), of such applications remains a cr...
Luc Malrait
SIGMETRICS
2011
ACM
189views Hardware» more  SIGMETRICS 2011»
14 years 5 months ago
TCP behavior in sub packet regimes
Many network links in developing regions operate in the subpacket regime, an environment where the typical per-flow throughput is less than 1 packet per round-trip time. TCP and ...
Jay Chen, Janardhan R. Iyengar, Lakshminarayanan S...