Sciweavers

1272 search results - page 93 / 255
» Implementation of Bitmap Based Incognito and Performance Eva...
Sort
View
APSEC
2008
IEEE
14 years 3 months ago
Test Case Prioritization Based on Analysis of Program Structure
Test case prioritization techniques have been empirically proved to be effective in improving the rate of fault detection in regression testing. However, most of previous techniqu...
Zengkai Ma, Jianjun Zhao
APPT
2003
Springer
14 years 2 months ago
A Highly Efficient FC-SAN Based on Load Stream
The speed of storing and fetching data on SCSI disks has a great restriction on the efficiency of SAN based on Fiber Channel Network. In this paper, a high-efficient FC-SAN storage...
Jiwu Shu, Jun Yao, Changdong Fu, Weimin Zheng
DSN
2005
IEEE
14 years 2 months ago
ReStore: Symptom Based Soft Error Detection in Microprocessors
Device scaling and large scale integration have led to growing concerns about soft errors in microprocessors. To date, in all but the most demanding applications, implementing par...
Nicholas J. Wang, Sanjay J. Patel
MDM
2009
Springer
118views Communications» more  MDM 2009»
14 years 3 months ago
DigestJoin: Exploiting Fast Random Reads for Flash-Based Joins
Abstract—Flash disks have been an emerging secondary storage media. In particular, there have been portable devices, multimedia players and laptop computers that are configured ...
Yu Li, Sai Tung On, Jianliang Xu, Byron Choi, Haib...
ICCCN
2008
IEEE
14 years 3 months ago
Sentinel: Hardware-Accelerated Mitigation of Bot-Based DDoS Attacks
—Effective defenses against DDoS attacks that deplete resources at the network and transport layers have been deployed commercially. Therefore, DDoS attacks increasingly use norm...
Peter Djalaliev, Muhammad Jamshed, Nicholas Farnan...