Sciweavers

90 search results - page 15 / 18
» Investigating the Validity of a Test Case Selection Methodol...
Sort
View
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
13 years 11 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
OOPSLA
2007
Springer
14 years 1 months ago
The design and implementation of formal monitoring techniques
In runtime monitoring, a programmer specifies a piece of code to execute when a trace of events occurs during program execution. Previous and related work has shown that runtime m...
Eric Bodden
DATE
2007
IEEE
110views Hardware» more  DATE 2007»
14 years 1 months ago
Nonlinearity analysis of Analog/RF circuits using combined multisine and volterra analysis
Abstract— Modern integrated radio systems require highly linear analog/RF circuits. Two-tone simulations are commonly used to study a circuit’s nonlinear behavior. Very often, ...
Jonathan Borremans, Ludwig De Locht, Piet Wambacq,...
HUC
2009
Springer
13 years 12 months ago
Eye movement analysis for activity recognition
In this work we investigate eye movement analysis as a new modality for recognising human activity. We devise 90 different features based on the main eye movement characteristics:...
Andreas Bulling, Jamie A. Ward, Hans Gellersen, Ge...
DAC
2002
ACM
14 years 8 months ago
The next chip challenge: effective methods for viable mixed technology SoCs
The next generation of computer chips will continue the trend for more complexity than their predecessors. Many of them will contain different chip technologies and are termed SoC...
H. Bernhard Pogge