Sciweavers

861 search results - page 67 / 173
» Predicting Attack-prone Components
Sort
View
ICST
2011
IEEE
13 years 2 months ago
An Empirical Study on the Relation between Dependency Neighborhoods and Failures
—Changing source code in large software systems is complex and requires a good understanding of dependencies between software components. Modification to components with little ...
Thomas Zimmermann, Nachiappan Nagappan, Kim Herzig...
EXPCS
2007
14 years 2 months ago
Introducing entropies for representing program behavior and branch predictor performance
Predictors are inherent components of state-of-the-art microprocessors. Branch predictors are discussed actively from diverse perspectives. Performance of a branch predictor large...
Takashi Yokota, Kanemitsu Ootsu, Takanobu Baba
SIGMETRICS
1998
ACM
187views Hardware» more  SIGMETRICS 1998»
14 years 3 months ago
An Analytic Behavior Model for Disk Drives with Readahead Caches and Request Reordering
Modern disk drives read-ahead data and reorder incoming requests in a workload-dependent fashion. This improves their performance, but makes simple analytical models of them inade...
Elizabeth A. M. Shriver, Arif Merchant, John Wilke...
SAC
2009
ACM
14 years 5 months ago
Component-based metrics applying the strength of dependency between classes
Component-Based Development(CBD) is an emerging discipline for promoting practical reuse of software. In CBD, by building new software with independently developed components, we ...
Misook Choi, Injoo J. Kim, Jiman Hong, Jungyeop Ki...
WOWMOM
2006
ACM
162views Multimedia» more  WOWMOM 2006»
14 years 4 months ago
Gauging VoIP Call Quality from 802.11 WLAN Resource Usage
In this paper we experimentally study the relationship between resource utilization in the wireless LAN and the quality of VoIP calls transmitted over the wireless medium. Specifi...
Miroslaw Narbutt, Mark Davis