Sciweavers

1336 search results - page 16 / 268
» SMTP Path Analysis
Sort
View
ISPASS
2006
IEEE
14 years 1 months ago
Critical path analysis of the TRIPS architecture
Fast, accurate, and effective performance analysis is essential for the design of modern processor architectures and improving application performance. Recent trends toward highly...
Ramadass Nagarajan, Xia Chen, Robert G. McDonald, ...
PEPM
1995
ACM
13 years 11 months ago
Shape Analysis as a Generalized Path Problem
This paper concerns a method for approximating the possible “shapes” that heap-allocated structures in a program can take on. We present a new approach to finding solutions t...
Thomas W. Reps
PRDC
2008
IEEE
14 years 2 months ago
Indirect Control Path Analysis and Goal Coverage Strategies for Elaborating System Safety Goals in Composite Systems
Correctly specifying requirements for composite systems is essential to system safety, particularly in a distributed development environment. Goal-oriented requirements engineerin...
Jennifer Black, Philip Koopman
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
14 years 2 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
ATS
2002
IEEE
110views Hardware» more  ATS 2002»
14 years 20 days ago
Test Requirement Analysis for Low Cost Hierarchical Test Path Construction
We propose a methodology that examines design modules and identifies appropriate vector justification and response propagation requirements for hierarchical test. Based on a cel...
Yiorgos Makris, Alex Orailoglu