Sciweavers

861 search results - page 129 / 173
» Predicting Attack-prone Components
Sort
View
CAISE
2003
Springer
14 years 27 days ago
No-redundant Metrics for UML Class Diagram Structural Complexity
In software engineering it is widely acknowledged that the usage of metrics at the initial phases of the object oriented software life cycle can help designers to make better decis...
M. Esperanza Manso, Marcela Genero, Mario Piattini
ICCS
2003
Springer
14 years 26 days ago
Virtual Telemetry for Dynamic Data-Driven Application Simulations
Abstract. We describe a virtual telemetry system that allows us to devise and augment dynamic data-driven application simulations (DDDAS). Virtual telemetry has the advantage that ...
Craig C. Douglas, Yalchin Efendiev, Richard E. Ewi...
CODES
2002
IEEE
14 years 19 days ago
Compiler-directed customization of ASIP cores
This paper presents an automatic method to customize embedded application-specific instruction processors (ASIPs) based on compiler analysis. ASIPs, also known as embedded soft c...
T. Vinod Kumar Gupta, Roberto E. Ko, Rajeev Barua
ICECCS
2002
IEEE
79views Hardware» more  ICECCS 2002»
14 years 18 days ago
A Framework for Performability Modeling of Messaging Services in Distributed Systems
Messaging services are a useful component in distributed systems that require scalable dissemination of messages (events) from suppliers to consumers. These services decouple supp...
Srinivasan Ramani, Katerina Goseva-Popstojanova, K...
INFOCOM
2002
IEEE
14 years 17 days ago
Analysis of Measured Single-Hop Delay from an Operational Backbone Network
— We measure and analyze the single-hop packet delay through operational routers in a backbone IP network. First we present our delay measurements through a single router. Then w...
Konstantina Papagiannaki, Sue B. Moon, Chuck Frale...