Sciweavers

1821 search results - page 320 / 365
» Security-Aware Program Transformations
Sort
View
CODES
2009
IEEE
14 years 3 months ago
FlexRay schedule optimization of the static segment
The FlexRay bus is the prospective automotive standard communication system. For the sake of a high flexibility, the protocol includes a static time-triggered and a dynamic event...
Martin Lukasiewycz, Michael Glaß, Jürge...
KBSE
2009
IEEE
14 years 3 months ago
ReAssert: Suggesting Repairs for Broken Unit Tests
—Developers often change software in ways that cause tests to fail. When this occurs, developers must determine whether failures are caused by errors in the code under test or in...
Brett Daniel, Vilas Jagannath, Danny Dig, Darko Ma...
INFOCOM
2009
IEEE
14 years 3 months ago
Minimizing the Cost of Mine Selection Via Sensor Networks
— In this paper, we study sensor enabled landmine networks by formulating a minimum-cost mine selection problem. The problem arises in a target defence scenario, where the object...
Changlei Liu, Guohong Cao
IPPS
2009
IEEE
14 years 3 months ago
Singular value decomposition on GPU using CUDA
Linear algebra algorithms are fundamental to many computing applications. Modern GPUs are suited for many general purpose processing tasks and have emerged as inexpensive high per...
Sheetal Lahabar, P. J. Narayanan
ESA
2009
Springer
143views Algorithms» more  ESA 2009»
14 years 3 months ago
On Optimally Partitioning a Text to Improve Its Compression
In this paper we investigate the problem of partitioning an input string T in such a way that compressing individually its parts via a basecompressor C gets a compressed output th...
Paolo Ferragina, Igor Nitto, Rossano Venturini