Sciweavers

4922 search results - page 899 / 985
» Internet time out
Sort
View
PLDI
1990
ACM
14 years 26 days ago
A Fresh Look at Optimizing Array Bound Checking
- This paper describes techniques for optimizing range checks performed to detect array bound violations. In addition to the elimination of range check:s, the optimizations discuss...
Rajiv Gupta
ATAL
2007
Springer
14 years 25 days ago
A unified framework for multi-agent agreement
Multi-Agent Agreement problems (MAP) - the ability of a population of agents to search out and converge on a common state - are central issues in many multi-agent settings, from d...
Kiran Lakkaraju, Les Gasser
ISCA
2010
IEEE
199views Hardware» more  ISCA 2010»
14 years 24 days ago
Use ECP, not ECC, for hard failures in resistive memories
As leakage and other charge storage limitations begin to impair the scalability of DRAM, non-volatile resistive memories are being developed as a potential replacement. Unfortunat...
Stuart E. Schechter, Gabriel H. Loh, Karin Straus,...
AINA
2004
IEEE
14 years 17 days ago
Online Training of SVMs for Real-time Intrusion Detection
Abstract-- As intrusion detection essentially can be formulated as a binary classification problem, it thus can be solved by an effective classification technique-Support Vector Ma...
Zonghua Zhang, Hong Shen
APSEC
2004
IEEE
14 years 17 days ago
JAOUT: Automated Generation of Aspect-Oriented Unit Test
Unit testing is a methodology for testing small parts of an application independently of whatever application uses them. It is time consuming and tedious to write unit tests, and ...
Guoqing Xu, Zongyuan Yang, Haitao Huang, Qian Chen...