Sciweavers

1265 search results - page 164 / 253
» Performance Measurement of Interpreted Programs
Sort
View
ISSTA
2004
ACM
14 years 2 months ago
Testing malware detectors
In today’s interconnected world, malware, such as worms and viruses, can cause havoc. A malware detector (commonly known as virus scanner) attempts to identify malware. In spite...
Mihai Christodorescu, Somesh Jha
BIODATAMINING
2008
147views more  BIODATAMINING 2008»
13 years 9 months ago
Neural networks for genetic epidemiology: past, present, and future
During the past two decades, the field of human genetics has experienced an information explosion. The completion of the human genome project and the development of high throughpu...
Alison A. Motsinger-Reif, Marylyn D. Ritchie
PERCOM
2003
ACM
14 years 8 months ago
Evaluation of Kalman Filtering for Network Time Keeping
Time information is critical for a variety of applications in distributed environments that facilitate pervasive computing and communication. This work describes and evaluates a no...
Aggelos Bletsas
ISLPED
2006
ACM
74views Hardware» more  ISLPED 2006»
14 years 2 months ago
Power phase variation in a commercial server workload
Many techniques have been developed for adaptive power management of computing systems. These techniques rely on the presence of varying power phases to detect opportunities for a...
W. L. Bircher, L. K. John
IWMM
2010
Springer
137views Hardware» more  IWMM 2010»
14 years 24 days ago
The locality of concurrent write barriers
Concurrent and incremental collectors require barriers to ensure correct synchronisation between mutator and collector. The overheads imposed by particular barriers on particular ...
Laurence Hellyer, Richard Jones, Antony L. Hosking