Sciweavers

3667 search results - page 620 / 734
» Software Rejuvenation - Modeling and Analysis
Sort
View
CISS
2008
IEEE
14 years 3 months ago
Secure transmission power of cognitive radios for dynamic spectrum access applications
—One of the major concerns of cognitive radios when used for secondary spectrum access is the potential of interfering primary users, considering especially that cognitive radios...
Xiaohua Li, Jinying Chen, Fan Ng
IEEEARES
2008
IEEE
14 years 3 months ago
A Lightweight Security Analyzer inside GCC
This paper describes the design and implementation of a lightweight static security analyzer that exploits the compilation process of the gcc compiler. The tool is aimed at giving...
Davide Pozza, Riccardo Sisto
IEEEARES
2008
IEEE
14 years 3 months ago
Detecting Bots Based on Keylogging Activities
—A bot is a piece of software that is usually installed on an infected machine without the user’s knowledge. A bot is controlled remotely by the attacker under a Command and Co...
Yousof Al-Hammadi, Uwe Aickelin
IISWC
2008
IEEE
14 years 3 months ago
PARSEC vs. SPLASH-2: A quantitative comparison of two multithreaded benchmark suites on Chip-Multiprocessors
The PARSEC benchmark suite was recently released and has been adopted by a significant number of users within a short amount of time. This new collection of workloads is not yet ...
Christian Bienia, Sanjeev Kumar, Kai Li
IPPS
2008
IEEE
14 years 3 months ago
Outlier detection in performance data of parallel applications
— When an adaptive software component is employed to select the best-performing implementation for a communication operation at runtime, the correctness of the decision taken str...
Katharina Benkert, Edgar Gabriel, Michael M. Resch