Sciweavers

1012 search results - page 21 / 203
» Identification of System Software Components Using Clusterin...
Sort
View
RE
2002
Springer
13 years 7 months ago
A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System
Requirements analysis for an Intrusion Detection System (IDS) involves deriving requirements for the IDS from analysis of the intrusion domain. When the IDS is, as here, a collecti...
Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasan...
BMCBI
2011
13 years 2 months ago
Motif-guided sparse decomposition of gene expression data for regulatory module identification
Background: Genes work coordinately as gene modules or gene networks. Various computational approaches have been proposed to find gene modules based on gene expression data; for e...
Ting Gong, Jianhua Xuan, Li Chen, Rebecca B. Riggi...
WCRE
1997
IEEE
13 years 12 months ago
Generation of Components for Software Renovation Factories from Context-Free Grammars
We present an approach for the generation of components for a software renovation factory. These components are generated from a context-free grammar definition that recognizes t...
Mark van den Brand, M. P. A. Sellink, Chris Verhoe...
HPCA
2002
IEEE
14 years 8 months ago
Using Complete Machine Simulation for Software Power Estimation: The SoftWatt Approach
Power dissipation has become one of the most critical factors for the continued development of both high-end and low-end computer systems. The successful design and evaluation of ...
Sudhanva Gurumurthi, Anand Sivasubramaniam, Mary J...
CLUSTER
2007
IEEE
13 years 9 months ago
Blutopia: Stackable storage for cluster management
— The complexity of today’s computer systems poses a challenge to system administrators. Current systems comprise a multitude of inter-related software components running on di...
Fábio Oliveira, Gorka Guardiola, Jay A. Pat...