Sciweavers

4636 search results - page 388 / 928
» Modelling and Validation with VipTool
Sort
View
INFOCOM
2003
IEEE
15 years 10 months ago
Modeling Malware Spreading Dynamics
— In this paper we present analytical techniques that can be used to better understand the behavior of malware, a generic term that refers to all kinds of malicious software prog...
Michele Garetto, Weibo Gong, Donald F. Towsley
GECCO
2003
Springer
182views Optimization» more  GECCO 2003»
15 years 10 months ago
Modeling the Search Landscape of Metaheuristic Software Clustering Algorithms
Abstract. Software clustering techniques are useful for extracting architectural information about a system directly from its source code structure. This paper starts by examining ...
Brian S. Mitchell, Spiros Mancoridis
IPMI
2003
Springer
15 years 10 months ago
Neighbor-Constrained Segmentation with 3D Deformable Models
A novel method for the segmentation of multiple objects from 3D medical images using inter-object constraints is presented. Our method is motivated by the observation that neighbor...
Jing Yang, Lawrence H. Staib, James S. Duncan
DATE
2010
IEEE
202views Hardware» more  DATE 2010»
15 years 9 months ago
FlashPower: A detailed power model for NAND flash memory
Abstract— Flash memory is widely used in consumer electronics products, such as cell-phones and music players, and is increasingly displacing hard disk drives as the primary stor...
Vidyabhushan Mohan, Sudhanva Gurumurthi, Mircea R....
TOOLS
2000
IEEE
15 years 9 months ago
Testing-for-Trust: The Genetic Selection Model Applied to Component Qualification
This paper presents a method and a tool for building trustable OO components. The methodology is based on an integrated design and test approach for OO software components. It is ...
Benoit Baudry, Vu Le Hanh, Yves Le Traon